We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50051

ASoC: SOF: debug: Fix potential buffer overflow by snprintf()



Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: debug: Fix potential buffer overflow by snprintf() snprintf() returns the would-be-filled size when the string overflows the given buffer size, hence using this value may result in the buffer overflow (although it's unrealistic). This patch replaces with a safer version, scnprintf() for papering over such a potential issue.

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

5b10b62989219aa527ee4fa555d1995a3b70981b before b318b9dd2ac67f39d0338ce563879d1f59a0347a
affected

5b10b62989219aa527ee4fa555d1995a3b70981b before a67971a17604ae7de278fb09243432459afc51e1
affected

5b10b62989219aa527ee4fa555d1995a3b70981b before 1eb123ce985e6cf302ac6e3f19862d132d86fa8f
affected

Default status
affected

5.11
affected

Any version before 5.11
unaffected

5.15.63
unaffected

5.19.4
unaffected

6.0
unaffected

References

git.kernel.org/...c/b318b9dd2ac67f39d0338ce563879d1f59a0347a

git.kernel.org/...c/a67971a17604ae7de278fb09243432459afc51e1

git.kernel.org/...c/1eb123ce985e6cf302ac6e3f19862d132d86fa8f

cve.org (CVE-2022-50051)

nvd.nist.gov (CVE-2022-50051)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50051

Support options

Helpdesk Chat, Email, Knowledgebase