Home

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: soc-acpi-intel-rpl-match: add missing empty item There is no links_num in struct snd_soc_acpi_mach {}, and we test !link->num_adr as a condition to end the loop in hda_sdw_machine_select(). So an empty item in struct snd_soc_acpi_link_adr array is required.

PUBLISHED Reserved 2024-10-21 | Published 2024-10-21 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

65ab45b90656e9b7ed51bce27ab7d83618167e76 (git) before aa3109ee91fe09e696274e6ac44813df8d13678f
affected

65ab45b90656e9b7ed51bce27ab7d83618167e76 (git) before 5afc29ba44fdd1bcbad4e07246c395d946301580
affected

Default status
affected

6.11
affected

Any version before 6.11
unaffected

6.11.3 (semver)
unaffected

6.12 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/aa3109ee91fe09e696274e6ac44813df8d13678f

git.kernel.org/...c/5afc29ba44fdd1bcbad4e07246c395d946301580

cve.org (CVE-2024-50011)

nvd.nist.gov (CVE-2024-50011)

Download JSON