CVE-2022-49005

In the Linux kernel, the following vulnerability has been resolved:

ASoC: ops: Fix bounds check for _sx controls

For _sx controls the semantics of the max field is not the usual one, max
is the number of steps rather than the maximum value. This means that our
check in snd_soc_put_volsw_sx() needs to just check against the maximum
value.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
LinuxCNA
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 6%
VendorProductVersion
linuxlinux_kernel
4.9.300 ≤
𝑥
< 4.9.335
linuxlinux_kernel
4.14.265 ≤
𝑥
< 4.14.301
linuxlinux_kernel
4.19.228 ≤
𝑥
< 4.19.268
linuxlinux_kernel
5.4.178 ≤
𝑥
< 5.4.226
linuxlinux_kernel
5.10.99 ≤
𝑥
< 5.10.158
linuxlinux_kernel
5.15.22 ≤
𝑥
< 5.15.82
linuxlinux_kernel
5.16.8 ≤
𝑥
< 5.17
linuxlinux_kernel
5.17 ≤
𝑥
< 6.0.12
linuxlinux_kernel
6.1:rc1
linuxlinux_kernel
6.1:rc2
linuxlinux_kernel
6.1:rc3
linuxlinux_kernel
6.1:rc4
linuxlinux_kernel
6.1:rc5
linuxlinux_kernel
6.1:rc6
linuxlinux_kernel
6.1:rc7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bullseye
5.10.223-1
fixed
bullseye (security)
5.10.226-1
fixed
bookworm
6.1.106-3
fixed
bookworm (security)
6.1.112-1
fixed
trixie
6.11.5-1
fixed
sid
6.11.6-1
fixed