First published: Thu Jun 20 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ASoC: max9759: fix underflow in speaker_gain_control_put() Check for negative values of "priv->gain" to prevent an out of bounds access. The concern is that these might come from the user via: -> snd_ctl_elem_write_user() -> snd_ctl_elem_write() -> kctl->put()
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=4.17<4.19.228 | |
Linux Kernel | >=4.20<5.4.178 | |
Linux Kernel | >=5.5<5.10.99 | |
Linux Kernel | >=5.11<5.15.22 | |
Linux Kernel | >=5.16<5.16.8 | |
Linux Kernel | =5.17-rc1 | |
Linux Kernel | =5.17-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48717 has been classified as a medium severity vulnerability.
To fix CVE-2022-48717, update to the latest version of the Linux kernel that includes the patch for this vulnerability.
CVE-2022-48717 is caused by an underflow in the speaker_gain_control_put function within the Linux kernel's ASoC subsystem.
CVE-2022-48717 affects systems running specific versions of the Linux kernel that include the ASoC component.
Yes, CVE-2022-48717 poses an exploit risk as it allows out-of-bounds access potentially leading to denial of service or other malicious activity.