CVE-2022-50049

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-50049
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50049.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50049
Downstream
Related
Published
2025-06-18T11:01:49Z
Modified
2025-10-13T23:50:00.294247Z
Summary
ASoC: DPCM: Don't pick up BE without substream
Details

In the Linux kernel, the following vulnerability has been resolved:

ASoC: DPCM: Don't pick up BE without substream

When DPCM tries to add valid BE connections at dpcmaddpaths(), it doesn't check whether the picked BE actually supports for the given stream direction. Due to that, when an asymmetric BE stream is present, it picks up wrongly and this may result in a NULL dereference at a later point where the code assumes the existence of a corresponding BE substream.

This patch adds the check for the presence of the substream for the target BE for avoiding the problem above.

Note that we have already some fix for non-existing BE substream at commit 6246f283d5e0 ("ASoC: dpcm: skip missing substream while applying symmetry"). But the code path we've hit recently is rather happening before the previous fix. So this patch tries to fix at picking up a BE instead of parsing BE lists.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c474bb800000d1a93624f6d060e2bba16edf6820
Fixed
aa803e6ecac78e93b24ebefa17c207d6392d8ad4
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bbf7d3b1c4f40eb02dd1dffb500ba00b0bff0303
Fixed
6a840e8ef6b6c56d1b7e6a555adc31135e517875
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bbf7d3b1c4f40eb02dd1dffb500ba00b0bff0303
Fixed
754590651ccbbcc74a7c20907be4bb15d642bde3

Affected versions

v5.*

v5.16
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v5.19.1
v5.19.2
v5.19.3

Database specific

{
    "vanir_signatures": [
        {
            "signature_version": "v1",
            "deprecated": false,
            "digest": {
                "length": 500.0,
                "function_hash": "168242535573597796213316784709187378328"
            },
            "id": "CVE-2022-50049-47e6cca3",
            "target": {
                "function": "dpcm_get_be",
                "file": "sound/soc/soc-pcm.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aa803e6ecac78e93b24ebefa17c207d6392d8ad4"
        },
        {
            "signature_version": "v1",
            "deprecated": false,
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "296093918458503953363197308978642984363",
                    "208701193310348487103729220852462775738",
                    "174421131763577023795243105106692089033"
                ]
            },
            "id": "CVE-2022-50049-52dd72ea",
            "target": {
                "file": "sound/soc/soc-pcm.c"
            },
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aa803e6ecac78e93b24ebefa17c207d6392d8ad4"
        },
        {
            "signature_version": "v1",
            "deprecated": false,
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "296093918458503953363197308978642984363",
                    "208701193310348487103729220852462775738",
                    "174421131763577023795243105106692089033"
                ]
            },
            "id": "CVE-2022-50049-9fb211b4",
            "target": {
                "file": "sound/soc/soc-pcm.c"
            },
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@754590651ccbbcc74a7c20907be4bb15d642bde3"
        },
        {
            "signature_version": "v1",
            "deprecated": false,
            "digest": {
                "length": 500.0,
                "function_hash": "168242535573597796213316784709187378328"
            },
            "id": "CVE-2022-50049-a515c173",
            "target": {
                "function": "dpcm_get_be",
                "file": "sound/soc/soc-pcm.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6a840e8ef6b6c56d1b7e6a555adc31135e517875"
        },
        {
            "signature_version": "v1",
            "deprecated": false,
            "digest": {
                "length": 500.0,
                "function_hash": "168242535573597796213316784709187378328"
            },
            "id": "CVE-2022-50049-db877f54",
            "target": {
                "function": "dpcm_get_be",
                "file": "sound/soc/soc-pcm.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@754590651ccbbcc74a7c20907be4bb15d642bde3"
        },
        {
            "signature_version": "v1",
            "deprecated": false,
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "296093918458503953363197308978642984363",
                    "208701193310348487103729220852462775738",
                    "174421131763577023795243105106692089033"
                ]
            },
            "id": "CVE-2022-50049-f4804dca",
            "target": {
                "file": "sound/soc/soc-pcm.c"
            },
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6a840e8ef6b6c56d1b7e6a555adc31135e517875"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
5.19.4