Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Check for null pointer of pointer substream before dereferencing it Pointer substream is being dereferenced on the assignment of pointer card before substream is being null checked with the macro PCM_RUNTIME_CHECK. Although PCM_RUNTIME_CHECK calls BUG_ON, it still is useful to perform the the pointer check before card is assigned.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.6, < 5.10.121 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/011b559be832194f992f73d6c0d5485f5925a10bPatch
- https://git.kernel.org/stable/c/1f2e28857be1e5c7db39bbc221332215fc5467e3Patch
- https://git.kernel.org/stable/c/7784d22f81a29df2ec57ca90d54f93a35cbcd1a2Patch
- https://git.kernel.org/stable/c/b2421a196cb0911ea95aec1050a0b830464c8fa6Patch
- https://git.kernel.org/stable/c/b41ef7ad9238c22aa2e142f5ce4ce1a1a0d48123Patch
- https://git.kernel.org/stable/c/f2c68c52898f623fe84518da4606538d193b0ccaPatch
FAQ
What is CVE-2022-49498?
CVE-2022-49498 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Check for null pointer of pointer substream before dereferencing it Pointer substream is being dereferenced on the assi...
How severe is CVE-2022-49498?
CVE-2022-49498 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49498?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.