U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-48917 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min While the $val/$val2 values passed in from userspace are always >= 0 integers, the limits of the control can be signed integers and the $min can be non-zero and less than zero. To correctly validate $val/$val2 against platform_max, add the $min offset to val first.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/050b1821f27c5d4fd5a298f6e62c3d3c9335e622 Patch 
https://git.kernel.org/stable/c/0b2ecc9163472128e7f30b517bee92dcd27ffc34 Patch 
https://git.kernel.org/stable/c/6951a5888165a38bb7c39a2d18f5668b2f1241c7 Patch 
https://git.kernel.org/stable/c/69f42e41256d5a234d3ae0d35fa66dc6d8171846 Patch 
https://git.kernel.org/stable/c/70712d5afbbea898d5f51fa02e315fe0a4835043 Patch 
https://git.kernel.org/stable/c/7e0e4bc93811cf600508ff36f07abea7b40643ed Patch 
https://git.kernel.org/stable/c/9bdd10d57a8807dba0003af0325191f3cec0f11c Patch 
https://git.kernel.org/stable/c/f3537f1b2bfd3b1df15723df49fc26eccd5112fe Patch 

Weakness Enumeration

CWE-ID CWE Name Source
NVD-CWE-noinfo Insufficient Information cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-48917
NVD Published Date:
08/21/2024
NVD Last Modified:
09/12/2024
Source:
kernel.org