{"id":"CVE-2022-49515","summary":"ASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t\n\nThe CS35L41_NUM_OTP_ELEM is 100, but only 99 entries are defined in\nthe array otp_map_1/2[CS35L41_NUM_OTP_ELEM], this will trigger UBSAN\nto report a shift-out-of-bounds warning in the cs35l41_otp_unpack()\nsince the last entry in the array will result in GENMASK(-1, 0).\n\nUBSAN reports this problem:\n UBSAN: shift-out-of-bounds in /home/hwang4/build/jammy/jammy/sound/soc/codecs/cs35l41-lib.c:836:8\n shift exponent 64 is too large for 64-bit type 'long unsigned int'\n CPU: 10 PID: 595 Comm: systemd-udevd Not tainted 5.15.0-23-generic #23\n Hardware name: LENOVO \\x02MFG_IN_GO/\\x02MFG_IN_GO, BIOS N3GET19W (1.00 ) 03/11/2022\n Call Trace:\n  \u003cTASK\u003e\n  show_stack+0x52/0x58\n  dump_stack_lvl+0x4a/0x5f\n  dump_stack+0x10/0x12\n  ubsan_epilogue+0x9/0x45\n  __ubsan_handle_shift_out_of_bounds.cold+0x61/0xef\n  ? regmap_unlock_mutex+0xe/0x10\n  cs35l41_otp_unpack.cold+0x1c6/0x2b2 [snd_soc_cs35l41_lib]\n  cs35l41_hda_probe+0x24f/0x33a [snd_hda_scodec_cs35l41]\n  cs35l41_hda_i2c_probe+0x65/0x90 [snd_hda_scodec_cs35l41_i2c]\n  ? cs35l41_hda_i2c_remove+0x20/0x20 [snd_hda_scodec_cs35l41_i2c]\n  i2c_device_probe+0x252/0x2b0","modified":"2026-04-02T08:27:39.662867Z","published":"2025-02-26T02:13:43.888Z","related":["SUSE-SU-2025:1027-1","SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1241-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49515.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/9f342904216f378e88008bb0ce1ae200a4b99fe8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a59b9958416096dd21dc4f62b0c5be525d459ca8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dbc35268e14d5d89c7a9db72009ad4dcd9ede646"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49515.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49515"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"6450ef55905688602175fae4ed1bfbfef6a14dde"},{"fixed":"dbc35268e14d5d89c7a9db72009ad4dcd9ede646"},{"fixed":"a59b9958416096dd21dc4f62b0c5be525d459ca8"},{"fixed":"9f342904216f378e88008bb0ce1ae200a4b99fe8"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49515.json"}}],"schema_version":"1.7.5"}