First published: Thu Jun 20 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ASoC: max9759: fix underflow in speaker_gain_control_put() Check for negative values of "priv->gain" to prevent an out of bounds access. The concern is that these might come from the user via: -> snd_ctl_elem_write_user() -> snd_ctl_elem_write() -> kctl->put()
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48717 has been classified as a medium severity vulnerability.
To fix CVE-2022-48717, update to the latest version of the Linux kernel that includes the patch for this vulnerability.
CVE-2022-48717 is caused by an underflow in the speaker_gain_control_put function within the Linux kernel's ASoC subsystem.
CVE-2022-48717 affects systems running specific versions of the Linux kernel that include the ASoC component.
Yes, CVE-2022-48717 poses an exploit risk as it allows out-of-bounds access potentially leading to denial of service or other malicious activity.