In the Linux kernel, the following vulnerability has been resolved:
ASoC: max9759: fix underflow in speakergaincontrol_put()
Check for negative values of "priv->gain" to prevent an out of bounds access. The concern is that these might come from the user via: -> sndctlelemwriteuser() -> sndctlelem_write() -> kctl->put()
[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"78040415561622537884580566560065436053",
"303085424668264811841169546403588577740",
"245547518624121539110311491983596714028",
"319643233971980956070683764151189072203"
]
},
"signature_type": "Line",
"target": {
"file": "sound/soc/codecs/max9759.c"
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@baead410e5db49e962a67fffc17ac30e44b50b7c",
"signature_version": "v1",
"id": "CVE-2022-48717-017f1f40"
},
{
"digest": {
"length": 441.0,
"function_hash": "184951347778604271639694981596448750490"
},
"signature_type": "Function",
"target": {
"function": "speaker_gain_control_put",
"file": "sound/soc/codecs/max9759.c"
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@baead410e5db49e962a67fffc17ac30e44b50b7c",
"signature_version": "v1",
"id": "CVE-2022-48717-025dacb0"
},
{
"digest": {
"length": 441.0,
"function_hash": "184951347778604271639694981596448750490"
},
"signature_type": "Function",
"target": {
"function": "speaker_gain_control_put",
"file": "sound/soc/codecs/max9759.c"
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a0f49d12547d45ea8b0f356a96632dd503941c1e",
"signature_version": "v1",
"id": "CVE-2022-48717-9cfa358b"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"78040415561622537884580566560065436053",
"303085424668264811841169546403588577740",
"245547518624121539110311491983596714028",
"319643233971980956070683764151189072203"
]
},
"signature_type": "Line",
"target": {
"file": "sound/soc/codecs/max9759.c"
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a0f49d12547d45ea8b0f356a96632dd503941c1e",
"signature_version": "v1",
"id": "CVE-2022-48717-a07dd5f1"
}
]