-

CVE-2022-50325

In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: avs: Fix potential RX buffer overflow

If an event caused firmware to return invalid RX size for
LARGE_CONFIG_GET, memcpy_fromio() could end up copying too many bytes.
Fix by utilizing min_t().

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < ec1f0c12cb2e614c3fa8e9402f7ffcf82166078a
Version f14a1c5a9f830025dc8638303ddefd5f731ae4bc
Status affected
Version < 0bad12fee5ae16ab439d97c66c4238f5f4cc7f68
Version f14a1c5a9f830025dc8638303ddefd5f731ae4bc
Status affected
Version < 23ae34e033b2c0e5e88237af82b163b296fd6aa9
Version f14a1c5a9f830025dc8638303ddefd5f731ae4bc
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.18
Status affected
Version < 5.18
Version 0
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.043
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string