CVE-2022-48917

In the Linux kernel, the following vulnerability has been resolved: ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min While the $val/$val2 values passed in from userspace are always >= 0 integers, the limits of the control can be signed integers and the $min can be non-zero and less than zero. To correctly validate $val/$val2 against platform_max, add the $min offset to val first.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

12 Sep 2024, 13:07

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/050b1821f27c5d4fd5a298f6e62c3d3c9335e622 - () https://git.kernel.org/stable/c/050b1821f27c5d4fd5a298f6e62c3d3c9335e622 - Patch
References () https://git.kernel.org/stable/c/0b2ecc9163472128e7f30b517bee92dcd27ffc34 - () https://git.kernel.org/stable/c/0b2ecc9163472128e7f30b517bee92dcd27ffc34 - Patch
References () https://git.kernel.org/stable/c/6951a5888165a38bb7c39a2d18f5668b2f1241c7 - () https://git.kernel.org/stable/c/6951a5888165a38bb7c39a2d18f5668b2f1241c7 - Patch
References () https://git.kernel.org/stable/c/69f42e41256d5a234d3ae0d35fa66dc6d8171846 - () https://git.kernel.org/stable/c/69f42e41256d5a234d3ae0d35fa66dc6d8171846 - Patch
References () https://git.kernel.org/stable/c/70712d5afbbea898d5f51fa02e315fe0a4835043 - () https://git.kernel.org/stable/c/70712d5afbbea898d5f51fa02e315fe0a4835043 - Patch
References () https://git.kernel.org/stable/c/7e0e4bc93811cf600508ff36f07abea7b40643ed - () https://git.kernel.org/stable/c/7e0e4bc93811cf600508ff36f07abea7b40643ed - Patch
References () https://git.kernel.org/stable/c/9bdd10d57a8807dba0003af0325191f3cec0f11c - () https://git.kernel.org/stable/c/9bdd10d57a8807dba0003af0325191f3cec0f11c - Patch
References () https://git.kernel.org/stable/c/f3537f1b2bfd3b1df15723df49fc26eccd5112fe - () https://git.kernel.org/stable/c/f3537f1b2bfd3b1df15723df49fc26eccd5112fe - Patch

22 Aug 2024, 12:48

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: ops: Shift valores probados en snd_soc_put_volsw() por +min Mientras que los valores $val/$val2 pasados desde el espacio de usuario son siempre >= 0 enteros, los límites del control pueden ser números enteros con signo y $min puede ser distinto de cero y menor que cero. Para validar correctamente $val/$val2 contra platform_max, primero agregue el desplazamiento $min a val.

22 Aug 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-22 02:15

Updated : 2024-09-12 13:07


NVD link : CVE-2022-48917

Mitre link : CVE-2022-48917

CVE.ORG link : CVE-2022-48917


JSON object : View

Products Affected

linux

  • linux_kernel