In the Linux kernel, the following vulnerability has been resolved:
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
We don't currently validate that the values being set are within the range
we advertised to userspace as being valid, do so and reject any values
that are out of range.
References
Configurations
Configuration 1 (hide)
|
History
29 Sep 2025, 18:39
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-125 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d - Patch | |
References | () https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7 - Patch | |
References | () https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf - Patch | |
References | () https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7 - Patch | |
References | () https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0 - Patch | |
References | () https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830 - Patch | |
References | () https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a - Patch | |
References | () https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
21 Nov 2024, 07:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d - | |
References | () https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7 - | |
References | () https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf - | |
References | () https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7 - | |
References | () https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0 - | |
References | () https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830 - | |
References | () https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a - | |
References | () https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d - | |
Summary |
|
20 Jun 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-20 12:15
Updated : 2025-09-29 18:39
NVD link : CVE-2022-48738
Mitre link : CVE-2022-48738
CVE.ORG link : CVE-2022-48738
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read