We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-50011

ASoC: Intel: soc-acpi-intel-rpl-match: add missing empty item



Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: soc-acpi-intel-rpl-match: add missing empty item There is no links_num in struct snd_soc_acpi_mach {}, and we test !link->num_adr as a condition to end the loop in hda_sdw_machine_select(). So an empty item in struct snd_soc_acpi_link_adr array is required.

Reserved 2024-10-21 | Published 2024-10-21 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

65ab45b90656e9b7ed51bce27ab7d83618167e76 before aa3109ee91fe09e696274e6ac44813df8d13678f
affected

65ab45b90656e9b7ed51bce27ab7d83618167e76 before 5afc29ba44fdd1bcbad4e07246c395d946301580
affected

Default status
affected

6.11
affected

Any version before 6.11
unaffected

6.11.3
unaffected

6.12
unaffected

References

git.kernel.org/...c/aa3109ee91fe09e696274e6ac44813df8d13678f

git.kernel.org/...c/5afc29ba44fdd1bcbad4e07246c395d946301580

cve.org (CVE-2024-50011)

nvd.nist.gov (CVE-2024-50011)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-50011

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.