CVE-2022-48738

In the Linux kernel, the following vulnerability has been resolved: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() We don't currently validate that the values being set are within the range we advertised to userspace as being valid, do so and reject any values that are out of range.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*

History

29 Sep 2025, 18:39

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d - () https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d - Patch
References () https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7 - () https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7 - Patch
References () https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf - () https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf - Patch
References () https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7 - () https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7 - Patch
References () https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0 - () https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0 - Patch
References () https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830 - () https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830 - Patch
References () https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a - () https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a - Patch
References () https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d - () https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d - Patch
CWE CWE-125
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CPE cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel

Information

Published : 2024-06-20 12:15

Updated : 2025-09-29 18:39


NVD link : CVE-2022-48738

Mitre link : CVE-2022-48738

CVE.ORG link : CVE-2022-48738


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read