CVE-2022-49005

In the Linux kernel, the following vulnerability has been resolved: ASoC: ops: Fix bounds check for _sx controls For _sx controls the semantics of the max field is not the usual one, max is the number of steps rather than the maximum value. This means that our check in snd_soc_put_volsw_sx() needs to just check against the maximum value.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*

History

25 Oct 2024, 14:17

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/325d94d16e3131b54bdf07356e4cd855e0d853fc - () https://git.kernel.org/stable/c/325d94d16e3131b54bdf07356e4cd855e0d853fc - Patch
References () https://git.kernel.org/stable/c/46bab25cc0230df60d1c02b651cc5640a14b08df - () https://git.kernel.org/stable/c/46bab25cc0230df60d1c02b651cc5640a14b08df - Patch
References () https://git.kernel.org/stable/c/4a95a49f26308782b4056401989ecd7768fda8fa - () https://git.kernel.org/stable/c/4a95a49f26308782b4056401989ecd7768fda8fa - Patch
References () https://git.kernel.org/stable/c/698813ba8c580efb356ace8dbf55f61dac6063a8 - () https://git.kernel.org/stable/c/698813ba8c580efb356ace8dbf55f61dac6063a8 - Patch
References () https://git.kernel.org/stable/c/73dce3c1d48c4662bdf3ccbde1492c2cb4bfd8ce - () https://git.kernel.org/stable/c/73dce3c1d48c4662bdf3ccbde1492c2cb4bfd8ce - Patch
References () https://git.kernel.org/stable/c/98b15c706644bebc19d2e77ccc360cc51444f6d0 - () https://git.kernel.org/stable/c/98b15c706644bebc19d2e77ccc360cc51444f6d0 - Patch
References () https://git.kernel.org/stable/c/b50c9641897274c3faef5f95ac852f54b94be2e8 - () https://git.kernel.org/stable/c/b50c9641897274c3faef5f95ac852f54b94be2e8 - Patch
References () https://git.kernel.org/stable/c/e46adadf19248d59af3aa6bc52e09115bf479bf7 - () https://git.kernel.org/stable/c/e46adadf19248d59af3aa6bc52e09115bf479bf7 - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

23 Oct 2024, 15:13

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: ops: Fix bounds check for _sx controls Para los controles _sx, la semántica del campo max no es la habitual, max es el número de pasos en lugar del valor máximo. Esto significa que nuestra comprobación en snd_soc_put_volsw_sx() solo debe comprobarse con el valor máximo.

21 Oct 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 20:15

Updated : 2024-10-25 14:17


NVD link : CVE-2022-49005

Mitre link : CVE-2022-49005

CVE.ORG link : CVE-2022-49005


JSON object : View

Products Affected

linux

  • linux_kernel