fkie_cve-2022-48701
Vulnerability from fkie_nvd
Published
2024-05-03 16:15
Modified
2024-11-21 07:33
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() There may be a bad USB audio device with a USB ID of (0x04fa, 0x4201) and the number of it's interfaces less than 4, an out-of-bounds read bug occurs when parsing the interface descriptor for this device. Fix this by checking the number of interfaces.
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/0492798bf8dfcc09c9337a1ba065da1d1ca68712
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/2a308e415d247a23d4d64c964c02e782eede2936
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/6123bec8480d23369e2ee0b2208611619f269faf
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/8293e61bbf908b18ff9935238d4fc2ad359e3fe0
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/91904870370fd986c29719846ed76d559de43251
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/98e8e67395cc6d0cdf3a771f86ea42d0ee6e59dd
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/b970518014f2f0f6c493fb86c1e092b936899061
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/e53f47f6c1a56d2af728909f1cb894da6b43d9bf
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/0492798bf8dfcc09c9337a1ba065da1d1ca68712
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/2a308e415d247a23d4d64c964c02e782eede2936
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/6123bec8480d23369e2ee0b2208611619f269faf
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/8293e61bbf908b18ff9935238d4fc2ad359e3fe0
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/91904870370fd986c29719846ed76d559de43251
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/98e8e67395cc6d0cdf3a771f86ea42d0ee6e59dd
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/b970518014f2f0f6c493fb86c1e092b936899061
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/e53f47f6c1a56d2af728909f1cb894da6b43d9bf
Impacted products
Vendor Product Version



{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()\n\nThere may be a bad USB audio device with a USB ID of (0x04fa, 0x4201) and\nthe number of it\u0027s interfaces less than 4, an out-of-bounds read bug occurs\nwhen parsing the interface descriptor for this device.\n\nFix this by checking the number of interfaces."
    },
    {
      "lang": "es",
      "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: usb-audio: corrige un error fuera de los l\u00edmites en __snd_usb_parse_audio_interface() Puede haber un dispositivo de audio USB defectuoso con una ID de USB de (0x04fa, 0x4201) y el Si el n\u00famero de interfaces es inferior a 4, se produce un error de lectura fuera de l\u00edmites al analizar el descriptor de interfaz para este dispositivo. Solucione este problema verificando la cantidad de interfaces."
    }
  ],
  "id": "CVE-2022-48701",
  "lastModified": "2024-11-21T07:33:49.133",
  "metrics": {},
  "published": "2024-05-03T16:15:08.547",
  "references": [
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "url": "https://git.kernel.org/stable/c/0492798bf8dfcc09c9337a1ba065da1d1ca68712"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "url": "https://git.kernel.org/stable/c/2a308e415d247a23d4d64c964c02e782eede2936"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "url": "https://git.kernel.org/stable/c/6123bec8480d23369e2ee0b2208611619f269faf"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "url": "https://git.kernel.org/stable/c/8293e61bbf908b18ff9935238d4fc2ad359e3fe0"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "url": "https://git.kernel.org/stable/c/91904870370fd986c29719846ed76d559de43251"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "url": "https://git.kernel.org/stable/c/98e8e67395cc6d0cdf3a771f86ea42d0ee6e59dd"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "url": "https://git.kernel.org/stable/c/b970518014f2f0f6c493fb86c1e092b936899061"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "url": "https://git.kernel.org/stable/c/e53f47f6c1a56d2af728909f1cb894da6b43d9bf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.kernel.org/stable/c/0492798bf8dfcc09c9337a1ba065da1d1ca68712"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.kernel.org/stable/c/2a308e415d247a23d4d64c964c02e782eede2936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.kernel.org/stable/c/6123bec8480d23369e2ee0b2208611619f269faf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.kernel.org/stable/c/8293e61bbf908b18ff9935238d4fc2ad359e3fe0"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.kernel.org/stable/c/91904870370fd986c29719846ed76d559de43251"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.kernel.org/stable/c/98e8e67395cc6d0cdf3a771f86ea42d0ee6e59dd"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.kernel.org/stable/c/b970518014f2f0f6c493fb86c1e092b936899061"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.kernel.org/stable/c/e53f47f6c1a56d2af728909f1cb894da6b43d9bf"
    }
  ],
  "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
  "vulnStatus": "Awaiting Analysis"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.