CVE-2022-48738

In the Linux kernel, the following vulnerability has been resolved: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() We don't currently validate that the values being set are within the range we advertised to userspace as being valid, do so and reject any values that are out of range.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*

History

29 Sep 2025, 18:39

Type Values Removed Values Added
CWE CWE-125
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d - () https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d - Patch
References () https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7 - () https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7 - Patch
References () https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf - () https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf - Patch
References () https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7 - () https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7 - Patch
References () https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0 - () https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0 - Patch
References () https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830 - () https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830 - Patch
References () https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a - () https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a - Patch
References () https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d - () https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d - Patch
CPE cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Nov 2024, 07:33

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d - () https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d -
References () https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7 - () https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7 -
References () https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf - () https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf -
References () https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7 - () https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7 -
References () https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0 - () https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0 -
References () https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830 - () https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830 -
References () https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a - () https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a -
References () https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d - () https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: ops: Rechazar valores fuera de los límites en snd_soc_put_volsw() Actualmente no validamos que los valores que se establecen estén dentro del rango que anunciamos en el espacio de usuario como válidos, hágalo y rechazar cualquier valor que esté fuera de rango.

20 Jun 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 12:15

Updated : 2025-09-29 18:39


NVD link : CVE-2022-48738

Mitre link : CVE-2022-48738

CVE.ORG link : CVE-2022-48738


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read