In the Linux kernel, the following vulnerability has been resolved:
ASoC: soc-pcm: Add NULL check in BE reparenting
Add NULL check in dpcmbereparent API, to handle kernel NULL pointer dereference error. The issue occurred in fuzzing test.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48992.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48992.json"
[
{
"signature_version": "v1",
"target": {
"file": "sound/soc/soc-pcm.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d4dd21a79dbb862d2ebcf9ed90e646416009ff0d",
"deprecated": false,
"digest": {
"line_hashes": [
"231887962778469403331777242164650362837",
"134537360263537043778544957219890841762",
"316556654173285710335929466863163090441",
"131324696741950946089787568016176014905"
],
"threshold": 0.9
},
"id": "CVE-2022-48992-1b2d68be",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "sound/soc/soc-pcm.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9f74b9aa8d58c18927bb9b65dd5ba70a5fd61615",
"deprecated": false,
"digest": {
"line_hashes": [
"231887962778469403331777242164650362837",
"183489200792134213957797596404428899874",
"92917401244818771091404239053771560562",
"288804200407172776903747254983394247622"
],
"threshold": 0.9
},
"id": "CVE-2022-48992-2eb3c388",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "sound/soc/soc-pcm.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e7166d6821c15f3516bcac8ae3f155924da1908c",
"deprecated": false,
"digest": {
"line_hashes": [
"231887962778469403331777242164650362837",
"134537360263537043778544957219890841762",
"316556654173285710335929466863163090441",
"131324696741950946089787568016176014905"
],
"threshold": 0.9
},
"id": "CVE-2022-48992-650964b9",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "sound/soc/soc-pcm.c",
"function": "dpcm_be_reparent"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d4dd21a79dbb862d2ebcf9ed90e646416009ff0d",
"deprecated": false,
"digest": {
"function_hash": "181032388710486260847439847303696250848",
"length": 584.0
},
"id": "CVE-2022-48992-954a5001",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "sound/soc/soc-pcm.c",
"function": "dpcm_be_reparent"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9f74b9aa8d58c18927bb9b65dd5ba70a5fd61615",
"deprecated": false,
"digest": {
"function_hash": "339451176280385726582964827464751347273",
"length": 547.0
},
"id": "CVE-2022-48992-b572f8d9",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "sound/soc/soc-pcm.c",
"function": "dpcm_be_reparent"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e7166d6821c15f3516bcac8ae3f155924da1908c",
"deprecated": false,
"digest": {
"function_hash": "181032388710486260847439847303696250848",
"length": 584.0
},
"id": "CVE-2022-48992-c37c76aa",
"signature_type": "Function"
}
]