CVE-2022-49937
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's mceusb driver sending an incorrect USB control message. Specifically, the driver issues a read request on endpoint 0 without setting the USB_DIR_IN bit in the bRequestType field, which causes a warning about an invalid pipe direction. The issue was identified through automatic kernel fuzzing and is fixed by updating the driver to use newer usb_control_msg_recv() and usb_control_msg_send() routines that handle these requests correctly.
How can this vulnerability impact me? :
The vulnerability causes the Linux kernel to generate warnings due to invalid USB control message directions in the mceusb driver. This could potentially lead to driver malfunctions or instability when handling USB devices using this driver. However, the description does not specify any direct security impact such as privilege escalation or data corruption.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for warnings related to the mceusb driver, specifically messages about invalid USB control pipe directions such as 'BOGUS control dir, pipe ... doesn't match bRequestType ...' and kernel WARN messages from usb_submit_urb in drivers/usb/core/urb.c. You can use commands like 'dmesg | grep mceusb' or 'journalctl -k | grep usb' to look for these warnings in the kernel logs.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the mceusb driver uses the new usb_control_msg_recv() and usb_control_msg_send() routines, which fix the invalid USB control message direction issue. Until an update is applied, monitoring logs for the warning and avoiding use of affected hardware or drivers may help reduce risk.