CVE-2022-48992

Source
https://cve.org/CVERecord?id=CVE-2022-48992
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48992.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48992
Downstream
Related
Published
2024-10-21T20:06:09.495Z
Modified
2026-03-12T03:24:21.339739Z
Summary
ASoC: soc-pcm: Add NULL check in BE reparenting
Details

In the Linux kernel, the following vulnerability has been resolved:

ASoC: soc-pcm: Add NULL check in BE reparenting

Add NULL check in dpcmbereparent API, to handle kernel NULL pointer dereference error. The issue occurred in fuzzing test.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48992.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
01d7584cd2e5a93a2b959c9dddaa0d93ec205404
Fixed
0760acc2e6598ad4f7bd3662db2d907ef0838139
Fixed
d4dd21a79dbb862d2ebcf9ed90e646416009ff0d
Fixed
e7166d6821c15f3516bcac8ae3f155924da1908c
Fixed
f2ba66d8738584d124aff4e760ed1337f5f6dfb6
Fixed
f6f45e538328df9ce66aa61bafee1a5717c4b700
Fixed
9f74b9aa8d58c18927bb9b65dd5ba70a5fd61615
Fixed
34a9796bf0684bfd54e96a142560d560c21c983b
Fixed
db8f91d424fe0ea6db337aca8bc05908bbce1498

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48992.json"