Improper Input Validation Affecting kernel package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-KERNEL-7827400
- published 23 Aug 2024
- disclosed 22 Aug 2024
Introduced: 22 Aug 2024
CVE-2022-48917 Open this link in a new tabHow to fix?
There is no fixed version for Centos:7
kernel
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel
package and not the kernel
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
While the $val/$val2 values passed in from userspace are always >= 0 integers, the limits of the control can be signed integers and the $min can be non-zero and less than zero. To correctly validate $val/$val2 against platform_max, add the $min offset to val first.
References
- https://access.redhat.com/security/cve/CVE-2022-48917
- https://git.kernel.org/stable/c/050b1821f27c5d4fd5a298f6e62c3d3c9335e622
- https://git.kernel.org/stable/c/0b2ecc9163472128e7f30b517bee92dcd27ffc34
- https://git.kernel.org/stable/c/6951a5888165a38bb7c39a2d18f5668b2f1241c7
- https://git.kernel.org/stable/c/69f42e41256d5a234d3ae0d35fa66dc6d8171846
- https://git.kernel.org/stable/c/70712d5afbbea898d5f51fa02e315fe0a4835043
- https://git.kernel.org/stable/c/7e0e4bc93811cf600508ff36f07abea7b40643ed
- https://git.kernel.org/stable/c/9bdd10d57a8807dba0003af0325191f3cec0f11c
- https://git.kernel.org/stable/c/f3537f1b2bfd3b1df15723df49fc26eccd5112fe