We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: Fix sc7280 lpass potential buffer overflow Case values introduced in commit 5f78e1fb7a3e ("ASoC: qcom: Add driver support for audioreach solution") cause out of bounds access in arrays of sc7280 driver data (e.g. in case of RX_CODEC_DMA_RX_0 in sc7280_snd_hw_params()). Redefine LPASS_MAX_PORTS to consider the maximum possible port id for q6dsp as sc7280 driver utilizes some of those values. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Reserved 2025-04-16 | Published 2025-05-20 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/d78888853eb53f47ae16cf3aa5d0444d0331b9f8
git.kernel.org/...c/a12c14577882b1f2b4cff0f86265682f16e97b0c
git.kernel.org/...c/c0ce01e0ff8a0d61a7b089ab309cdc12bc527c39
git.kernel.org/...c/b807b7c81a6d066757a94af7b8fa5b6a37e4d0b3
git.kernel.org/...c/a31a4934b31faea76e735bab17e63d02fcd8e029
Support options