0.0
NA
CVE-2022-49045
ALSA Null Pointer Dereference in Linux Kernel
Description

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

INFO

Published Date :

Feb. 26, 2025, 7 a.m.

Last Modified :

March 2, 2025, 3:15 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2022-49045 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
Solution
No remediation steps can be provided for a rejected or withdrawn CVE.
  • Consult the CNA for further information.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-49045 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-49045 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Rejected by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Mar. 02, 2025

    Action Type Old Value New Value
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Mar. 02, 2025

    Action Type Old Value New Value
    Changed Description In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Test for "silence" field in struct "pcm_format_data" Syzbot reports "KASAN: null-ptr-deref Write in snd_pcm_format_set_silence".[1] It is due to missing validation of the "silence" field of struct "pcm_format_data" in "pcm_formats" array. Add a test for valid "pat" and, if it is not so, return -EINVAL. [1] https://lore.kernel.org/lkml/[email protected]/ Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    Removed Reference kernel.org: https://git.kernel.org/stable/c/2f7a26abb8241a0208c68d22815aa247c5ddacab
    Removed Reference kernel.org: https://git.kernel.org/stable/c/377a80ca6590f40ec8a85227b889a5d399fe26c3
    Removed Reference kernel.org: https://git.kernel.org/stable/c/63038f6e96a77a0abf8083649c53e6a72c1a0124
    Removed Reference kernel.org: https://git.kernel.org/stable/c/77af45df08768401602472f3e3879dce14f55497
    Removed Reference kernel.org: https://git.kernel.org/stable/c/912797e54c99a98f0722f21313e13a3938bb6dba
    Removed Reference kernel.org: https://git.kernel.org/stable/c/97345c90235b1bb7661e7a428d9dcb96b1d7f5d4
    Removed Reference kernel.org: https://git.kernel.org/stable/c/c3b2f23bfe5452b00eb1c842bc71098449e4ad9f
    Removed Reference kernel.org: https://git.kernel.org/stable/c/eb04e3112a3516e483d60a9af9762961702a6c1b
  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Feb. 26, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Test for "silence" field in struct "pcm_format_data" Syzbot reports "KASAN: null-ptr-deref Write in snd_pcm_format_set_silence".[1] It is due to missing validation of the "silence" field of struct "pcm_format_data" in "pcm_formats" array. Add a test for valid "pat" and, if it is not so, return -EINVAL. [1] https://lore.kernel.org/lkml/[email protected]/
    Added Reference https://git.kernel.org/stable/c/2f7a26abb8241a0208c68d22815aa247c5ddacab
    Added Reference https://git.kernel.org/stable/c/377a80ca6590f40ec8a85227b889a5d399fe26c3
    Added Reference https://git.kernel.org/stable/c/63038f6e96a77a0abf8083649c53e6a72c1a0124
    Added Reference https://git.kernel.org/stable/c/77af45df08768401602472f3e3879dce14f55497
    Added Reference https://git.kernel.org/stable/c/912797e54c99a98f0722f21313e13a3938bb6dba
    Added Reference https://git.kernel.org/stable/c/97345c90235b1bb7661e7a428d9dcb96b1d7f5d4
    Added Reference https://git.kernel.org/stable/c/c3b2f23bfe5452b00eb1c842bc71098449e4ad9f
    Added Reference https://git.kernel.org/stable/c/eb04e3112a3516e483d60a9af9762961702a6c1b
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
No CVSS metrics available for this vulnerability.