CVE-2022-49005

In the Linux kernel, the following vulnerability has been resolved: ASoC: ops: Fix bounds check for _sx controls For _sx controls the semantics of the max field is not the usual one, max is the number of steps rather than the maximum value. This means that our check in snd_soc_put_volsw_sx() needs to just check against the maximum value.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

25 Oct 2024, 14:17

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/46bab25cc0230df60d1c02b651cc5640a14b08df - () https://git.kernel.org/stable/c/46bab25cc0230df60d1c02b651cc5640a14b08df - Patch
References () https://git.kernel.org/stable/c/325d94d16e3131b54bdf07356e4cd855e0d853fc - () https://git.kernel.org/stable/c/325d94d16e3131b54bdf07356e4cd855e0d853fc - Patch
References () https://git.kernel.org/stable/c/98b15c706644bebc19d2e77ccc360cc51444f6d0 - () https://git.kernel.org/stable/c/98b15c706644bebc19d2e77ccc360cc51444f6d0 - Patch
References () https://git.kernel.org/stable/c/698813ba8c580efb356ace8dbf55f61dac6063a8 - () https://git.kernel.org/stable/c/698813ba8c580efb356ace8dbf55f61dac6063a8 - Patch
References () https://git.kernel.org/stable/c/b50c9641897274c3faef5f95ac852f54b94be2e8 - () https://git.kernel.org/stable/c/b50c9641897274c3faef5f95ac852f54b94be2e8 - Patch
References () https://git.kernel.org/stable/c/4a95a49f26308782b4056401989ecd7768fda8fa - () https://git.kernel.org/stable/c/4a95a49f26308782b4056401989ecd7768fda8fa - Patch
References () https://git.kernel.org/stable/c/73dce3c1d48c4662bdf3ccbde1492c2cb4bfd8ce - () https://git.kernel.org/stable/c/73dce3c1d48c4662bdf3ccbde1492c2cb4bfd8ce - Patch
References () https://git.kernel.org/stable/c/e46adadf19248d59af3aa6bc52e09115bf479bf7 - () https://git.kernel.org/stable/c/e46adadf19248d59af3aa6bc52e09115bf479bf7 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Oct 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 20:15

Updated : 2024-10-25 14:17


NVD link : CVE-2022-49005

Mitre link : CVE-2022-49005


JSON object : View

Products Affected

linux

  • linux_kernel