Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ASoC: DPCM: Don't pick up BE without substream When DPCM tries to add valid BE connections at dpcm_add_paths(), it doesn't check whether the picked BE actually supports for the given stream direction. Due to that, when an asymmetric BE stream is present, it picks up wrongly and this may result in a NULL dereference at a later point where the code assumes the existence of a corresponding BE substream. This patch adds the check for the presence of the substream for the target BE for avoiding the problem above. Note that we have already some fix for non-existing BE substream at commit 6246f283d5e0 ("ASoC: dpcm: skip missing substream while applying symmetry"). But the code path we've hit recently is rather happening before the previous fix. So this patch tries to fix at picking up a BE instead of parsing BE lists.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.17, < 5.19.4 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/6a840e8ef6b6c56d1b7e6a555adc31135e517875Patch
- https://git.kernel.org/stable/c/754590651ccbbcc74a7c20907be4bb15d642bde3Patch
- https://git.kernel.org/stable/c/aa803e6ecac78e93b24ebefa17c207d6392d8ad4Patch
FAQ
What is CVE-2022-50049?
CVE-2022-50049 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: ASoC: DPCM: Don't pick up BE without substream When DPCM tries to add valid BE connections at dpcm_add_paths(), it doesn't check w...
How severe is CVE-2022-50049?
CVE-2022-50049 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-50049?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.