We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50050

ASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf()



Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf() snprintf() returns the would-be-filled size when the string overflows the given buffer size, hence using this value may result in the buffer overflow (although it's unrealistic). This patch replaces with a safer version, scnprintf() for papering over such a potential issue.

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

29c8e4398f02adacd429c7847dacc8aea5a0c2f1 before 6ee1310f4d148dbf04c4159b88afd0b941018903
affected

29c8e4398f02adacd429c7847dacc8aea5a0c2f1 before f7915c5614a7ece117ec390f21a410531eac48de
affected

29c8e4398f02adacd429c7847dacc8aea5a0c2f1 before 94c1ceb043c1a002de9649bb630c8e8347645982
affected

Default status
affected

5.10
affected

Any version before 5.10
unaffected

5.15.63
unaffected

5.19.4
unaffected

6.0
unaffected

References

git.kernel.org/...c/6ee1310f4d148dbf04c4159b88afd0b941018903

git.kernel.org/...c/f7915c5614a7ece117ec390f21a410531eac48de

git.kernel.org/...c/94c1ceb043c1a002de9649bb630c8e8347645982

cve.org (CVE-2022-50050)

nvd.nist.gov (CVE-2022-50050)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50050

Support options

Helpdesk Chat, Email, Knowledgebase