In the Linux kernel, the following vulnerability has been resolved:
ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
While the $val/$val2 values passed in from userspace are always >= 0
integers, the limits of the control can be signed integers and the $min
can be non-zero and less than zero. To correctly validate $val/$val2
against platform_max, add the $min offset to val first.
References
Configurations
Configuration 1 (hide)
|
History
12 Sep 2024, 13:07
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () https://git.kernel.org/stable/c/050b1821f27c5d4fd5a298f6e62c3d3c9335e622 - Patch | |
References | () https://git.kernel.org/stable/c/0b2ecc9163472128e7f30b517bee92dcd27ffc34 - Patch | |
References | () https://git.kernel.org/stable/c/6951a5888165a38bb7c39a2d18f5668b2f1241c7 - Patch | |
References | () https://git.kernel.org/stable/c/69f42e41256d5a234d3ae0d35fa66dc6d8171846 - Patch | |
References | () https://git.kernel.org/stable/c/70712d5afbbea898d5f51fa02e315fe0a4835043 - Patch | |
References | () https://git.kernel.org/stable/c/7e0e4bc93811cf600508ff36f07abea7b40643ed - Patch | |
References | () https://git.kernel.org/stable/c/9bdd10d57a8807dba0003af0325191f3cec0f11c - Patch | |
References | () https://git.kernel.org/stable/c/f3537f1b2bfd3b1df15723df49fc26eccd5112fe - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux linux Kernel
Linux |
|
CWE | NVD-CWE-noinfo |
22 Aug 2024, 12:48
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
22 Aug 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-22 02:15
Updated : 2024-09-12 13:07
NVD link : CVE-2022-48917
Mitre link : CVE-2022-48917
CVE.ORG link : CVE-2022-48917
JSON object : View
Products Affected
linux
- linux_kernel
CWE