Executive Summary

Informations
Name CVE-2022-49538 First vendor Publication 2025-02-26
Vendor Cve Last vendor Modification 2025-03-10

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

ALSA: jack: Access input_dev under mutex

It is possible when using ASoC that input_dev is unregistered while calling snd_jack_report, which causes NULL pointer dereference. In order to prevent this serialize access to input_dev using mutex lock.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49538

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3538

Sources (Detail)

https://git.kernel.org/stable/c/1b6a6fc5280e97559287b61eade2d4b363e836f2
https://git.kernel.org/stable/c/582aea6084cc59fec881204f026816d1219f2348
https://git.kernel.org/stable/c/5cc6f623f4818c7d7e9e966a45ebf324901ca9c5
https://git.kernel.org/stable/c/74bab3bcf422593c582e47130aa8eb41ebb2dc09
https://git.kernel.org/stable/c/8487a88136d54a1a4d3f26f1399685db648ab879
https://git.kernel.org/stable/c/9e6a73b0c0f2014eb89249fb1640c5a3d58221c4
https://git.kernel.org/stable/c/c093b62c40027c21d649c5534ad7aa3605a99b00
https://git.kernel.org/stable/c/e2b8681769f6e205382f026b907d28aa5ec9d59a
https://git.kernel.org/stable/c/f68bed124c7699e23ffb4ce4fcc84671e9193cde
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
Date Informations
2025-06-26 02:09:54
  • Multiple Updates
2025-06-25 12:22:45
  • Multiple Updates
2025-06-24 02:14:30
  • Multiple Updates
2025-05-27 02:11:16
  • Multiple Updates
2025-03-29 03:14:48
  • Multiple Updates
2025-03-28 13:35:09
  • Multiple Updates
2025-03-28 02:57:13
  • Multiple Updates
2025-03-19 00:20:56
  • Multiple Updates
2025-03-18 00:20:59
  • Multiple Updates
2025-03-14 00:21:28
  • Multiple Updates
2025-03-13 21:21:20
  • Multiple Updates
2025-03-11 00:21:31
  • Multiple Updates
2025-02-26 17:20:30
  • First insertion