In the Linux kernel, the following vulnerability has been resolved:
ASoC: max9759: fix underflow in speaker_gain_control_put()
Check for negative values of “priv->gain” to prevent an out of bounds
access. The concern is that these might come from the user via:
-> snd_ctl_elem_write_user()
-> snd_ctl_elem_write()
-> kctl->put()
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/4c907bcd9dcd233da6707059d777ab389dcbd964 (5.17-rc3)
git.kernel.org/stable/c/4c907bcd9dcd233da6707059d777ab389dcbd964
git.kernel.org/stable/c/5a45448ac95b715173edb1cd090ff24b6586d921
git.kernel.org/stable/c/71e60c170105d153e34d01766c1e4db26a4b24cc
git.kernel.org/stable/c/a0f49d12547d45ea8b0f356a96632dd503941c1e
git.kernel.org/stable/c/baead410e5db49e962a67fffc17ac30e44b50b7c
git.kernel.org/stable/c/f114fd6165dfb52520755cc4d1c1dfbd447b88b6
launchpad.net/bugs/cve/CVE-2022-48717
nvd.nist.gov/vuln/detail/CVE-2022-48717
security-tracker.debian.org/tracker/CVE-2022-48717
www.cve.org/CVERecord?id=CVE-2022-48717