CVE-2022-48716

In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: wcd938x: fix incorrect used of portid Mixer controls have the channel id in mixer->reg, which is not same as port id. port id should be derived from chan_info array. So fix this. Without this, its possible that we could corrupt struct wcd938x_sdw_priv by accessing port_map array out of range with channel id instead of port id.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*

History

01 Apr 2025, 18:27

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/9167f2712dc8c24964840a4d1e2ebf130e846b95 - () https://git.kernel.org/stable/c/9167f2712dc8c24964840a4d1e2ebf130e846b95 - Patch
References () https://git.kernel.org/stable/c/aa7152f9f117b3e66b3c0d4158ca4c6d46ab229f - () https://git.kernel.org/stable/c/aa7152f9f117b3e66b3c0d4158ca4c6d46ab229f - Patch
References () https://git.kernel.org/stable/c/c5c1546a654f613e291a7c5d6f3660fc1eb6d0c7 - () https://git.kernel.org/stable/c/c5c1546a654f613e291a7c5d6f3660fc1eb6d0c7 - Patch
First Time Linux
Linux linux Kernel

21 Nov 2024, 07:33

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/9167f2712dc8c24964840a4d1e2ebf130e846b95 - () https://git.kernel.org/stable/c/9167f2712dc8c24964840a4d1e2ebf130e846b95 -
References () https://git.kernel.org/stable/c/aa7152f9f117b3e66b3c0d4158ca4c6d46ab229f - () https://git.kernel.org/stable/c/aa7152f9f117b3e66b3c0d4158ca4c6d46ab229f -
References () https://git.kernel.org/stable/c/c5c1546a654f613e291a7c5d6f3660fc1eb6d0c7 - () https://git.kernel.org/stable/c/c5c1546a654f613e291a7c5d6f3660fc1eb6d0c7 -

03 Jul 2024, 01:39

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-400

20 Jun 2024, 12:43

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: ASoC: códecs: wcd938x: corrige el uso incorrecto del puerto Los controles del mezclador tienen la identificación del canal en mezclador->reg, que no es la misma que la identificación del puerto. La identificación del puerto debe derivarse de la matriz chan_info. Entonces arregla esto. Sin esto, es posible que podamos dañar la estructura wcd938x_sdw_priv accediendo a la matriz port_map fuera del rango con la identificación del canal en lugar de la identificación del puerto.

20 Jun 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 11:15

Updated : 2025-04-01 18:27


NVD link : CVE-2022-48716

Mitre link : CVE-2022-48716

CVE.ORG link : CVE-2022-48716


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-400

Uncontrolled Resource Consumption