{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T20:34:32.116","vulnerabilities":[{"cve":{"id":"CVE-2022-48836","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-07-16T13:15:11.133","lastModified":"2024-11-21T07:34:10.797","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nInput: aiptek - properly check endpoint type\n\nSyzbot reported warning in usb_submit_urb() which is caused by wrong\nendpoint type. There was a check for the number of endpoints, but not\nfor the type of endpoint.\n\nFix it by replacing old desc.bNumEndpoints check with\nusb_find_common_endpoints() helper for finding endpoints\n\nFail log:\n\nusb 5-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 2 PID: 48 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\nModules linked in:\nCPU: 2 PID: 48 Comm: kworker/2:2 Not tainted 5.17.0-rc6-syzkaller-00226-g07ebd38a0da2 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014\nWorkqueue: usb_hub_wq hub_event\n...\nCall Trace:\n <TASK>\n aiptek_open+0xd5/0x130 drivers/input/tablet/aiptek.c:830\n input_open_device+0x1bb/0x320 drivers/input/input.c:629\n kbd_connect+0xfe/0x160 drivers/tty/vt/keyboard.c:1593"},{"lang":"es","value":"En el kernel de Linux, se resolvió la siguiente vulnerabilidad: Entrada: aiptek: verifique correctamente el tipo de endpoint Syzbot informó una advertencia en usb_submit_urb() que se debe a un tipo de endpoint incorrecto. Se verificó la cantidad de endpoints, pero no el tipo de endpoint. Solucionarlo reemplazando la antigua comprobación desc.bNumEndpoints con el asistente usb_find_common_endpoints() para encontrar endpoints Registro de errores: usb 5-1: BOGUS urb xfer, tubería 1! = tipo 3 ADVERTENCIA: CPU: 2 PID: 48 en drivers/usb/core/ urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502 Módulos vinculados en: CPU: 2 PID: 48 Comm: kworker/2:2 No contaminado 5.17.0-rc6-syzkaller-00226- g07ebd38a0da2 #0 Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 01/04/2014 Cola de trabajo: usb_hub_wq hub_event ... Seguimiento de llamadas:  aiptek_open+0xd5/0x130 drivers/input/ tableta/aiptek.c:830 input_open_device+0x1bb/0x320 controladores/input/input.c:629 kbd_connect+0xfe/0x160 controladores/tty/vt/keyboard.c:1593"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4","versionEndExcluding":"4.9.308","matchCriteriaId":"95BAE078-A259-4798-9659-B68D181D29F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"4.14.273","matchCriteriaId":"A1E9CE4F-B0EA-4F88-9562-4F113E598085"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.15","versionEndExcluding":"4.19.236","matchCriteriaId":"09979837-E01F-4E28-B943-9F680CA3D278"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"5.4.187","matchCriteriaId":"D9FFB805-4ED2-4FAE-9EF4-8AB4BC9D8F5C"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.108","matchCriteriaId":"24925527-AC4A-4594-8D6C-3B34D31862C5"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"5.15.31","matchCriteriaId":"F25C317E-A673-47D1-844E-171C9BFDF352"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"5.16.17","matchCriteriaId":"DC9A634D-C617-4F8C-ADEF-AF94CE69D687"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/35069e654bcab567ff8b9f0e68e1caf82c15dcd7","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/5600f6986628dde8881734090588474f54a540a8","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/57277a8b5d881e02051ba9d7f6cb3f915c229821","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/6de20111cd0bb7da9b2294073ba00c7d2a6c1c4f","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/e732b0412f8c603d1e998f3bff41b5e7d5c3914c","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/e762f57ff255af28236cd02ca9fc5c7e5a089d31","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/f0d43d22d24182b94d7eb78a2bf6ae7e2b33204a","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/fc8033a55e2796d21e370260a784ac9fbb8305a6","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/35069e654bcab567ff8b9f0e68e1caf82c15dcd7","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/5600f6986628dde8881734090588474f54a540a8","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/57277a8b5d881e02051ba9d7f6cb3f915c229821","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/6de20111cd0bb7da9b2294073ba00c7d2a6c1c4f","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/e732b0412f8c603d1e998f3bff41b5e7d5c3914c","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/e762f57ff255af28236cd02ca9fc5c7e5a089d31","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/f0d43d22d24182b94d7eb78a2bf6ae7e2b33204a","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/fc8033a55e2796d21e370260a784ac9fbb8305a6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}