CVE-2022-48716

Source
https://cve.org/CVERecord?id=CVE-2022-48716
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48716.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48716
Downstream
Related
Published
2024-06-20T11:13:09.315Z
Modified
2026-03-13T05:40:27.190078Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
ASoC: codecs: wcd938x: fix incorrect used of portid
Details

In the Linux kernel, the following vulnerability has been resolved:

ASoC: codecs: wcd938x: fix incorrect used of portid

Mixer controls have the channel id in mixer->reg, which is not same as port id. port id should be derived from chaninfo array. So fix this. Without this, its possible that we could corrupt struct wcd938xsdwpriv by accessing portmap array out of range with channel id instead of port id.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48716.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e8ba1e05bdc016700c85fad559a812c2e795442f
Fixed
aa7152f9f117b3e66b3c0d4158ca4c6d46ab229f
Fixed
9167f2712dc8c24964840a4d1e2ebf130e846b95
Fixed
c5c1546a654f613e291a7c5d6f3660fc1eb6d0c7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48716.json"