In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()
There may be a bad USB audio device with a USB ID of (0x04fa, 0x4201) and
the number of it's interfaces less than 4, an out-of-bounds read bug occurs
when parsing the interface descriptor for this device.
Fix this by checking the number of interfaces.
References
Configurations
Configuration 1 (hide)
|
History
05 Mar 2025, 15:11
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-125 | |
References | () https://git.kernel.org/stable/c/0492798bf8dfcc09c9337a1ba065da1d1ca68712 - Patch | |
References | () https://git.kernel.org/stable/c/2a308e415d247a23d4d64c964c02e782eede2936 - Patch | |
References | () https://git.kernel.org/stable/c/6123bec8480d23369e2ee0b2208611619f269faf - Patch | |
References | () https://git.kernel.org/stable/c/8293e61bbf908b18ff9935238d4fc2ad359e3fe0 - Patch | |
References | () https://git.kernel.org/stable/c/91904870370fd986c29719846ed76d559de43251 - Patch | |
References | () https://git.kernel.org/stable/c/98e8e67395cc6d0cdf3a771f86ea42d0ee6e59dd - Patch | |
References | () https://git.kernel.org/stable/c/b970518014f2f0f6c493fb86c1e092b936899061 - Patch | |
References | () https://git.kernel.org/stable/c/e53f47f6c1a56d2af728909f1cb894da6b43d9bf - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:* |
21 Nov 2024, 07:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/0492798bf8dfcc09c9337a1ba065da1d1ca68712 - | |
References | () https://git.kernel.org/stable/c/2a308e415d247a23d4d64c964c02e782eede2936 - | |
References | () https://git.kernel.org/stable/c/6123bec8480d23369e2ee0b2208611619f269faf - | |
References | () https://git.kernel.org/stable/c/8293e61bbf908b18ff9935238d4fc2ad359e3fe0 - | |
References | () https://git.kernel.org/stable/c/91904870370fd986c29719846ed76d559de43251 - | |
References | () https://git.kernel.org/stable/c/98e8e67395cc6d0cdf3a771f86ea42d0ee6e59dd - | |
References | () https://git.kernel.org/stable/c/b970518014f2f0f6c493fb86c1e092b936899061 - | |
References | () https://git.kernel.org/stable/c/e53f47f6c1a56d2af728909f1cb894da6b43d9bf - | |
Summary |
|
03 May 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-03 16:15
Updated : 2025-03-05 15:11
NVD link : CVE-2022-48701
Mitre link : CVE-2022-48701
CVE.ORG link : CVE-2022-48701
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read