CVE-2022-49151

In the Linux kernel, the following vulnerability has been resolved: can: mcba_usb: properly check endpoint type Syzbot reported warning in usb_submit_urb() which is caused by wrong endpoint type. We should check that in endpoint is actually present to prevent this warning. Found pipes are now saved to struct mcba_priv and code uses them directly instead of making pipes in place. Fail log: | usb 5-1: BOGUS urb xfer, pipe 3 != type 1 | WARNING: CPU: 1 PID: 49 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502 | Modules linked in: | CPU: 1 PID: 49 Comm: kworker/1:2 Not tainted 5.17.0-rc6-syzkaller-00184-g38f80f42147f #0 | Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 | Workqueue: usb_hub_wq hub_event | RIP: 0010:usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502 | ... | Call Trace: | <TASK> | mcba_usb_start drivers/net/can/usb/mcba_usb.c:662 [inline] | mcba_usb_probe+0x8a3/0xc50 drivers/net/can/usb/mcba_usb.c:858 | usb_probe_interface+0x315/0x7f0 drivers/usb/core/driver.c:396 | call_driver_probe drivers/base/dd.c:517 [inline]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

15 Oct 2025, 19:47

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/136bed0bfd3bc9c95c88aafff2d22ecb3a919f23 - () https://git.kernel.org/stable/c/136bed0bfd3bc9c95c88aafff2d22ecb3a919f23 - Patch
References () https://git.kernel.org/stable/c/5598442edc29e8f6f2380e4b471dc1a3fcd80508 - () https://git.kernel.org/stable/c/5598442edc29e8f6f2380e4b471dc1a3fcd80508 - Patch
References () https://git.kernel.org/stable/c/88272b4a37913bdf6f339162a7920bd8e9b49de2 - () https://git.kernel.org/stable/c/88272b4a37913bdf6f339162a7920bd8e9b49de2 - Patch
References () https://git.kernel.org/stable/c/b48d1bb3f1ca337ad653022aefb5a40a47dfe5cd - () https://git.kernel.org/stable/c/b48d1bb3f1ca337ad653022aefb5a40a47dfe5cd - Patch
References () https://git.kernel.org/stable/c/cbd110b8dd7ad763bf413f71c0484116ae9302d4 - () https://git.kernel.org/stable/c/cbd110b8dd7ad763bf413f71c0484116ae9302d4 - Patch
References () https://git.kernel.org/stable/c/ef0acc514123140157b19a9ff2e2de5d91d612bc - () https://git.kernel.org/stable/c/ef0acc514123140157b19a9ff2e2de5d91d612bc - Patch
References () https://git.kernel.org/stable/c/f2ec3cd0f34f8c3f94bc21fbba14868301c9c49d - () https://git.kernel.org/stable/c/f2ec3cd0f34f8c3f94bc21fbba14868301c9c49d - Patch
References () https://git.kernel.org/stable/c/fa9c1f14002dc0d5293e16a2007bd89b6e79207b - () https://git.kernel.org/stable/c/fa9c1f14002dc0d5293e16a2007bd89b6e79207b - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: mcba_usb: comprobar correctamente el tipo de endpoint Syzbot informó de una advertencia en usb_submit_urb() que es causada por un tipo de endpoint incorrecto. Deberíamos comprobar que en el endpoint esté realmente presente para evitar esta advertencia. Las tuberías encontradas ahora se guardan en la estructura mcba_priv y el código las usa directamente en lugar de crear tuberías en su lugar. Registro de errores: | usb 5-1: BOGUS urb xfer, pipe 3 != type 1 | ADVERTENCIA: CPU: 1 PID: 49 en drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502 | Módulos vinculados en: | CPU: 1 PID: 49 Comm: kworker/1:2 No contaminado 5.17.0-rc6-syzkaller-00184-g38f80f42147f #0 | Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 | Cola de trabajo: usb_hub_wq hub_event | RIP: 0010:usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502 | ... | Seguimiento de llamadas: | | mcba_usb_start drivers/net/can/usb/mcba_usb.c:662 [en línea] | mcba_usb_probe+0x8a3/0xc50 drivers/net/can/usb/mcba_usb.c:858 | usb_probe_interface+0x315/0x7f0 drivers/usb/core/driver.c:396 | call_driver_probe drivers/base/dd.c:517 [en línea]
First Time Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-10-15 19:47


NVD link : CVE-2022-49151

Mitre link : CVE-2022-49151

CVE.ORG link : CVE-2022-49151


JSON object : View

Products Affected

linux

  • linux_kernel