CVE-2022-50049
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
18/06/2025
Last modified:
13/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ASoC: DPCM: Don&#39;t pick up BE without substream<br />
<br />
When DPCM tries to add valid BE connections at dpcm_add_paths(), it<br />
doesn&#39;t check whether the picked BE actually supports for the given<br />
stream direction. Due to that, when an asymmetric BE stream is<br />
present, it picks up wrongly and this may result in a NULL dereference<br />
at a later point where the code assumes the existence of a<br />
corresponding BE substream.<br />
<br />
This patch adds the check for the presence of the substream for the<br />
target BE for avoiding the problem above.<br />
<br />
Note that we have already some fix for non-existing BE substream at<br />
commit 6246f283d5e0 ("ASoC: dpcm: skip missing substream while<br />
applying symmetry"). But the code path we&#39;ve hit recently is rather<br />
happening before the previous fix. So this patch tries to fix at<br />
picking up a BE instead of parsing BE lists.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.17 (including) | 5.19.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



