摘要:
In the Linux kernel, the following vulnerability has been resolved:
ASoC: Intel: soc-acpi-intel-rpl-match: add missing empty item
There is no links_num in struct snd_soc_acpi_mach {}, and we test
!link->num_adr as a condition to end the loop in hda_sdw_machine_select().
So an empty item in struct snd_soc_acpi_link_adr array is required.
安全等级: Low
公告ID: KylinSec-SA-2024-4251
发布日期: 2024年12月8日
关联CVE: CVE-2024-50011
In the Linux kernel, the following vulnerability has been resolved:
ASoC: Intel: soc-acpi-intel-rpl-match: add missing empty item
There is no links_num in struct snd_soc_acpi_mach {}, and we test
!link->num_adr as a condition to end the loop in hda_sdw_machine_select().
So an empty item in struct snd_soc_acpi_link_adr array is required.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-50011 | KY3.4-5 | kernel | Unaffected |
CVE-2024-50011 | KY3.5.3 | kernel | Unaffected |
CVE-2024-50011 | V6 | kernel | Unaffected |