In the Linux kernel, the following vulnerability has been resolved:
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
We don’t currently validate that the values being set are within the range
we advertised to userspace as being valid, do so and reject any values
that are out of range.
git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d
git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7
git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf
git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7
git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0
git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830
git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a
git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d
security-tracker.debian.org/tracker/CVE-2022-48738