{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T16:55:24.276","vulnerabilities":[{"cve":{"id":"CVE-2022-49954","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-06-18T11:15:22.500","lastModified":"2025-11-14T18:59:26.417","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nInput: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag\n\nsyzbot is reporting hung task at __input_unregister_device() [1], for\niforce_close() waiting at wait_event_interruptible() with dev->mutex held\nis blocking input_disconnect_device() from __input_unregister_device().\n\nIt seems that the cause is simply that commit c2b27ef672992a20 (\"Input:\niforce - wait for command completion when closing the device\") forgot to\ncall wake_up() after clear_bit().\n\nFix this problem by introducing a helper that calls clear_bit() followed\nby wake_up_all()."},{"lang":"es","value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Entrada: iforce - reactivar tras borrar el indicador IFORCE_XMIT_RUNNING. syzbot informa que la tarea está bloqueada en __input_unregister_device() [1], ya que iforce_close() espera en wait_event_interruptible() con dev-&gt;mutex retenido, lo que bloquea input_disconnect_device() desde __input_unregister_device(). Parece que la causa es simplemente que el commit c2b27ef672992a20 (\"Entrada: iforce - esperar a que se complete el comando al cerrar el dispositivo\") olvidó llamar a wake_up() después de clear_bit(). Se soluciona este problema mediante un asistente que llame a clear_bit() seguido de wake_up_all()."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.34","versionEndExcluding":"5.4.213","matchCriteriaId":"8AE47490-60B7-492B-8196-2B12592AB5A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.142","matchCriteriaId":"D44AD643-5591-432E-BD41-C2C737F54AC0"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"5.15.66","matchCriteriaId":"52AE7E2B-7BE3-4B8A-89CC-AB62434899A3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"5.19.8","matchCriteriaId":"7FEC7656-4CE2-424C-8830-EDB160E701C8"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.33:-:*:*:*:*:*:*","matchCriteriaId":"EF818826-D9F2-42F9-9638-9609513561A3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*","matchCriteriaId":"1DE43C00-5967-44A1-ACEB-B7AF66EEBB53"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*","matchCriteriaId":"B33B5E4B-FCB3-4343-B992-F0ADB853754B"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*","matchCriteriaId":"D7295BBE-A9E3-44F6-9DD6-0FD6C2591E11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*","matchCriteriaId":"B220EA3F-55B3-4B6E-8285-B28ADEF50138"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.33:rc7:*:*:*:*:*:*","matchCriteriaId":"C61AB348-ACF4-4F88-AC9D-BEC63B76399C"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.33:rc8:*:*:*:*:*:*","matchCriteriaId":"C3AFD58E-A261-4398-BA11-B62A091261F6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*","matchCriteriaId":"E8BD11A3-8643-49B6-BADE-5029A0117325"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*","matchCriteriaId":"5F0AD220-F6A9-4012-8636-155F1B841FAD"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*","matchCriteriaId":"A46498B3-78E1-4623-AAE1-94D29A42BE4E"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/98e01215708b6d416345465c09dce2bd4868c67a","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/b271090eea3899399e2adcf79c9c95367d472b03","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/b533b9d3a0d1327cbb31c201dc8dbbf98c8bfe3c","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/d186c65599bff0222da37b9215784ddfe39f9e1b","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/df1b53bc799d58f79701c465505a206c72ad4ab8","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]}]}}]}