First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Check for null pointer of pointer substream before dereferencing it Pointer substream is being dereferenced on the assignment of pointer card before substream is being null checked with the macro PCM_RUNTIME_CHECK. Although PCM_RUNTIME_CHECK calls BUG_ON, it still is useful to perform the the pointer check before card is assigned.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.6<5.10.121 | |
Linux Kernel | >=5.11<5.15.46 | |
Linux Kernel | >=5.16<5.17.14 | |
Linux Kernel | >=5.18<5.18.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49498 has a medium severity rating as it affects the ALSA subsystem in the Linux kernel.
To fix CVE-2022-49498, update the Linux kernel to a version that is not affected by this vulnerability.
CVE-2022-49498 affects Linux kernel versions between 5.6 and 5.10.121, 5.11 and 5.15.46, 5.16 and 5.17.14, and 5.18 and 5.18.3.
CVE-2022-49498 is a null pointer dereference vulnerability in the ALSA subsystem of the Linux kernel.
CVE-2022-49498 typically requires local access for exploitation, as it involves the kernel ALSA subsystem.