CVE-2022-48951

In the Linux kernel, the following vulnerability has been resolved: ASoC: ops: Check bounds for second channel in snd_soc_put_volsw_sx() The bounds checks in snd_soc_put_volsw_sx() are only being applied to the first channel, meaning it is possible to write out of bounds values to the second channel in stereo controls. Add appropriate checks.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*

History

25 Oct 2024, 20:01

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-787
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/1798b62d642e7b3d4ea3403914c3caf4e438465d - () https://git.kernel.org/stable/c/1798b62d642e7b3d4ea3403914c3caf4e438465d - Patch
References () https://git.kernel.org/stable/c/18a168d85eadcfd45f015b5ecd2a97801b959e43 - () https://git.kernel.org/stable/c/18a168d85eadcfd45f015b5ecd2a97801b959e43 - Patch
References () https://git.kernel.org/stable/c/50b5f6d4d9d2d69a7498c44fd8b26e13d73d3d98 - () https://git.kernel.org/stable/c/50b5f6d4d9d2d69a7498c44fd8b26e13d73d3d98 - Patch
References () https://git.kernel.org/stable/c/56288987843c3cb343e81e5fa51549cbaf541bd0 - () https://git.kernel.org/stable/c/56288987843c3cb343e81e5fa51549cbaf541bd0 - Patch
References () https://git.kernel.org/stable/c/9796d07c753164b7e6b0d7ef23fb4482840a9ef8 - () https://git.kernel.org/stable/c/9796d07c753164b7e6b0d7ef23fb4482840a9ef8 - Patch
References () https://git.kernel.org/stable/c/97eea946b93961fffd29448dcda7398d0d51c4b2 - () https://git.kernel.org/stable/c/97eea946b93961fffd29448dcda7398d0d51c4b2 - Patch
References () https://git.kernel.org/stable/c/cf1c225f1927891ae388562b78ced7840c3723b9 - () https://git.kernel.org/stable/c/cf1c225f1927891ae388562b78ced7840c3723b9 - Patch
References () https://git.kernel.org/stable/c/cf611d786796ec33da09d8c83d7d7f4e557b27de - () https://git.kernel.org/stable/c/cf611d786796ec33da09d8c83d7d7f4e557b27de - Patch

23 Oct 2024, 15:13

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: ops: Verificar límites para el segundo canal en snd_soc_put_volsw_sx() Las comprobaciones de los límites en snd_soc_put_volsw_sx() solo se aplican al primer canal, lo que significa que es posible escribir valores fuera de los límites en el segundo canal en controles estéreo. Agregue las comprobaciones adecuadas.

21 Oct 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 20:15

Updated : 2024-10-25 20:01


NVD link : CVE-2022-48951

Mitre link : CVE-2022-48951

CVE.ORG link : CVE-2022-48951


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write