We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-50011

ASoC: Intel: soc-acpi-intel-rpl-match: add missing empty item



AssignerLinux
Reserved2024-10-21
Published2024-10-21
Updated2024-11-05

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: soc-acpi-intel-rpl-match: add missing empty item There is no links_num in struct snd_soc_acpi_mach {}, and we test !link->num_adr as a condition to end the loop in hda_sdw_machine_select(). So an empty item in struct snd_soc_acpi_link_adr array is required.

Product status

Default status
unaffected

65ab45b90656 before aa3109ee91fe
affected

65ab45b90656 before 5afc29ba44fd
affected

Default status
affected

6.11
affected

Any version before 6.11
unaffected

6.11.3
unaffected

6.12-rc2
unaffected

References

https://git.kernel.org/stable/c/aa3109ee91fe09e696274e6ac44813df8d13678f

https://git.kernel.org/stable/c/5afc29ba44fdd1bcbad4e07246c395d946301580

cve.org CVE-2024-50011

nvd.nist.gov CVE-2024-50011

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.