Home

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: avs: Fix potential RX buffer overflow If an event caused firmware to return invalid RX size for LARGE_CONFIG_GET, memcpy_fromio() could end up copying too many bytes. Fix by utilizing min_t().

PUBLISHED Reserved 2025-09-15 | Published 2025-09-15 | Updated 2025-09-15 | Assigner Linux

Product status

Default status
unaffected

f14a1c5a9f830025dc8638303ddefd5f731ae4bc (git) before ec1f0c12cb2e614c3fa8e9402f7ffcf82166078a
affected

f14a1c5a9f830025dc8638303ddefd5f731ae4bc (git) before 0bad12fee5ae16ab439d97c66c4238f5f4cc7f68
affected

f14a1c5a9f830025dc8638303ddefd5f731ae4bc (git) before 23ae34e033b2c0e5e88237af82b163b296fd6aa9
affected

Default status
affected

5.18
affected

Any version before 5.18
unaffected

6.0.16 (semver)
unaffected

6.1.2 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/ec1f0c12cb2e614c3fa8e9402f7ffcf82166078a

git.kernel.org/...c/0bad12fee5ae16ab439d97c66c4238f5f4cc7f68

git.kernel.org/...c/23ae34e033b2c0e5e88237af82b163b296fd6aa9

cve.org (CVE-2022-50325)

nvd.nist.gov (CVE-2022-50325)

Download JSON