摘要:
In the Linux kernel, the following vulnerability has been resolved:
ASoC: codecs: wcd938x: fix incorrect used of portid
Mixer controls have the channel id in mixer->reg, which is not same
as port id. port id should be derived from chan_info array.
So fix this. Without this, its possible that we could corrupt
struct wcd938x_sdw_priv by accessing port_map array out of range
with channel id instead of port id.
安全等级: Low
公告ID: KylinSec-SA-2024-2972
发布日期: 2024年7月3日
关联CVE: CVE-2022-48716
In the Linux kernel, the following vulnerability has been resolved:
ASoC: codecs: wcd938x: fix incorrect used of portid
Mixer controls have the channel id in mixer->reg, which is not same
as port id. port id should be derived from chan_info array.
So fix this. Without this, its possible that we could corrupt
struct wcd938x_sdw_priv by accessing port_map array out of range
with channel id instead of port id.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2022-48716 | KY3.4-5 | kernel | Unaffected |
CVE-2022-48716 | KY3.5.3 | kernel | Unaffected |
CVE-2022-48716 | V6 | kernel | Unaffected |