CVE-2022-49976 (GCVE-0-2022-49976)
Vulnerability from cvelistv5
Published
2025-06-18 11:00
Modified
2025-06-18 11:00
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: platform/x86: x86-android-tablets: Fix broken touchscreen on Chuwi Hi8 with Windows BIOS The x86-android-tablets handling for the Chuwi Hi8 is only necessary with the Android BIOS and it is causing problems with the Windows BIOS version. Specifically when trying to register the already present touchscreen x86_acpi_irq_helper_get() calls acpi_unregister_gsi(), this breaks the working of the touchscreen and also leads to an oops: [ 14.248946] ------------[ cut here ]------------ [ 14.248954] remove_proc_entry: removing non-empty directory 'irq/75', leaking at least 'MSSL0001:00' [ 14.248983] WARNING: CPU: 3 PID: 440 at fs/proc/generic.c:718 remove_proc_entry ... [ 14.249293] unregister_irq_proc+0xe0/0x100 [ 14.249305] free_desc+0x29/0x70 [ 14.249312] irq_free_descs+0x4b/0x80 [ 14.249320] mp_unmap_irq+0x5c/0x60 [ 14.249329] acpi_unregister_gsi_ioapic+0x2a/0x40 [ 14.249338] x86_acpi_irq_helper_get+0x4b/0x190 [x86_android_tablets] [ 14.249355] x86_android_tablet_init+0x178/0xe34 [x86_android_tablets] Add an init callback for the Chuwi Hi8, which detects when the Windows BIOS is in use and exits with -ENODEV in that case, fixing this.
Impacted products
Vendor Product Version
Linux Linux Version: 84c2dcdd475f3f5d1d30c87404cafba4dd4b75ec
Version: 84c2dcdd475f3f5d1d30c87404cafba4dd4b75ec
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/platform/x86/x86-android-tablets.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "c77b724cddfb8ac1291a60e3e68937e62cbfc5e0",
              "status": "affected",
              "version": "84c2dcdd475f3f5d1d30c87404cafba4dd4b75ec",
              "versionType": "git"
            },
            {
              "lessThan": "2986c51540ed50ac654ffb5a772e546c02628c91",
              "status": "affected",
              "version": "84c2dcdd475f3f5d1d30c87404cafba4dd4b75ec",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/platform/x86/x86-android-tablets.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.17"
            },
            {
              "lessThan": "5.17",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.19.*",
              "status": "unaffected",
              "version": "5.19.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.0",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.19.8",
                  "versionStartIncluding": "5.17",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.0",
                  "versionStartIncluding": "5.17",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: x86-android-tablets: Fix broken touchscreen on Chuwi Hi8 with Windows BIOS\n\nThe x86-android-tablets handling for the Chuwi Hi8 is only necessary with\nthe Android BIOS and it is causing problems with the Windows BIOS version.\n\nSpecifically when trying to register the already present touchscreen\nx86_acpi_irq_helper_get() calls acpi_unregister_gsi(), this breaks\nthe working of the touchscreen and also leads to an oops:\n\n[   14.248946] ------------[ cut here ]------------\n[   14.248954] remove_proc_entry: removing non-empty directory \u0027irq/75\u0027, leaking at least \u0027MSSL0001:00\u0027\n[   14.248983] WARNING: CPU: 3 PID: 440 at fs/proc/generic.c:718 remove_proc_entry\n...\n[   14.249293]  unregister_irq_proc+0xe0/0x100\n[   14.249305]  free_desc+0x29/0x70\n[   14.249312]  irq_free_descs+0x4b/0x80\n[   14.249320]  mp_unmap_irq+0x5c/0x60\n[   14.249329]  acpi_unregister_gsi_ioapic+0x2a/0x40\n[   14.249338]  x86_acpi_irq_helper_get+0x4b/0x190 [x86_android_tablets]\n[   14.249355]  x86_android_tablet_init+0x178/0xe34 [x86_android_tablets]\n\nAdd an init callback for the Chuwi Hi8, which detects when the Windows BIOS\nis in use and exits with -ENODEV in that case, fixing this."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-18T11:00:38.959Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/c77b724cddfb8ac1291a60e3e68937e62cbfc5e0"
        },
        {
          "url": "https://git.kernel.org/stable/c/2986c51540ed50ac654ffb5a772e546c02628c91"
        }
      ],
      "title": "platform/x86: x86-android-tablets: Fix broken touchscreen on Chuwi Hi8 with Windows BIOS",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-49976",
    "datePublished": "2025-06-18T11:00:38.959Z",
    "dateReserved": "2025-06-18T10:57:27.385Z",
    "dateUpdated": "2025-06-18T11:00:38.959Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-49976\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-06-18T11:15:25.007\",\"lastModified\":\"2025-06-18T13:46:52.973\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nplatform/x86: x86-android-tablets: Fix broken touchscreen on Chuwi Hi8 with Windows BIOS\\n\\nThe x86-android-tablets handling for the Chuwi Hi8 is only necessary with\\nthe Android BIOS and it is causing problems with the Windows BIOS version.\\n\\nSpecifically when trying to register the already present touchscreen\\nx86_acpi_irq_helper_get() calls acpi_unregister_gsi(), this breaks\\nthe working of the touchscreen and also leads to an oops:\\n\\n[   14.248946] ------------[ cut here ]------------\\n[   14.248954] remove_proc_entry: removing non-empty directory \u0027irq/75\u0027, leaking at least \u0027MSSL0001:00\u0027\\n[   14.248983] WARNING: CPU: 3 PID: 440 at fs/proc/generic.c:718 remove_proc_entry\\n...\\n[   14.249293]  unregister_irq_proc+0xe0/0x100\\n[   14.249305]  free_desc+0x29/0x70\\n[   14.249312]  irq_free_descs+0x4b/0x80\\n[   14.249320]  mp_unmap_irq+0x5c/0x60\\n[   14.249329]  acpi_unregister_gsi_ioapic+0x2a/0x40\\n[   14.249338]  x86_acpi_irq_helper_get+0x4b/0x190 [x86_android_tablets]\\n[   14.249355]  x86_android_tablet_init+0x178/0xe34 [x86_android_tablets]\\n\\nAdd an init callback for the Chuwi Hi8, which detects when the Windows BIOS\\nis in use and exits with -ENODEV in that case, fixing this.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: platform/x86: x86-android-tablets: Reparar la pantalla t\u00e1ctil rota en Chuwi Hi8 con BIOS de Windows El manejo de x86-android-tablets para Chuwi Hi8 solo es necesario con el BIOS de Android y est\u00e1 causando problemas con la versi\u00f3n del BIOS de Windows. Espec\u00edficamente cuando se intenta registrar la pantalla t\u00e1ctil ya presente, x86_acpi_irq_helper_get() llama a acpi_unregister_gsi(), esto interrumpe el funcionamiento de la pantalla t\u00e1ctil y tambi\u00e9n conduce a un error: [ 14.248946] ------------[ cortar aqu\u00ed ]------------ [ 14.248954] remove_proc_entry: eliminando el directorio no vac\u00edo \u0027irq/75\u0027, filtrando al menos \u0027MSSL0001:00\u0027 [ 14.248983] ADVERTENCIA: CPU: 3 PID: 440 en fs/proc/generic.c:718 remove_proc_entry ... [ 14.249293] unregister_irq_proc+0xe0/0x100 [ 14.249305] free_desc+0x29/0x70 [ 14.249312] irq_free_descs+0x4b/0x80 [ 14.249320] mp_unmap_irq+0x5c/0x60 [ 14.249329] acpi_unregister_gsi_ioapic+0x2a/0x40 [ 14.249338] x86_acpi_irq_helper_get+0x4b/0x190 [x86_android_tablets] [ 14.249355] x86_android_tablet_init+0x178/0xe34 [x86_android_tablets] Agregue una devoluci\u00f3n de llamada de inicio para Chuwi Hi8, que detecta cuando el BIOS de Windows est\u00e1 en uso y sale con -ENODEV en ese caso, solucionando esto.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/2986c51540ed50ac654ffb5a772e546c02628c91\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c77b724cddfb8ac1291a60e3e68937e62cbfc5e0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…