Description
In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: avs: Fix potential RX buffer overflow If an event caused firmware to return invalid RX size for LARGE_CONFIG_GET, memcpy_fromio() could end up copying too many bytes. Fix by utilizing min_t().
Product status
f14a1c5a9f830025dc8638303ddefd5f731ae4bc (git) before ec1f0c12cb2e614c3fa8e9402f7ffcf82166078a
f14a1c5a9f830025dc8638303ddefd5f731ae4bc (git) before 0bad12fee5ae16ab439d97c66c4238f5f4cc7f68
f14a1c5a9f830025dc8638303ddefd5f731ae4bc (git) before 23ae34e033b2c0e5e88237af82b163b296fd6aa9
5.18
Any version before 5.18
6.0.16 (semver)
6.1.2 (semver)
6.2 (original_commit_for_fix)
References
git.kernel.org/...c/ec1f0c12cb2e614c3fa8e9402f7ffcf82166078a
git.kernel.org/...c/0bad12fee5ae16ab439d97c66c4238f5f4cc7f68
git.kernel.org/...c/23ae34e033b2c0e5e88237af82b163b296fd6aa9