CVE-2024-50011

In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: soc-acpi-intel-rpl-match: add missing empty item There is no links_num in struct snd_soc_acpi_mach {}, and we test !link->num_adr as a condition to end the loop in hda_sdw_machine_select(). So an empty item in struct snd_soc_acpi_link_adr array is required.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*

History

01 Nov 2024, 15:31

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/5afc29ba44fdd1bcbad4e07246c395d946301580 - () https://git.kernel.org/stable/c/5afc29ba44fdd1bcbad4e07246c395d946301580 - Patch
References () https://git.kernel.org/stable/c/aa3109ee91fe09e696274e6ac44813df8d13678f - () https://git.kernel.org/stable/c/aa3109ee91fe09e696274e6ac44813df8d13678f - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
CWE CWE-835
First Time Linux
Linux linux Kernel

23 Oct 2024, 15:13

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: Intel: soc-acpi-intel-rpl-match: agregar elemento vacío faltante No hay links_num en struct snd_soc_acpi_mach {}, y probamos !link->num_adr como condición para finalizar el bucle en hda_sdw_machine_select(). Por lo tanto, se requiere un elemento vacío en la matriz struct snd_soc_acpi_link_adr.

21 Oct 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 19:15

Updated : 2024-11-01 15:31


NVD link : CVE-2024-50011

Mitre link : CVE-2024-50011

CVE.ORG link : CVE-2024-50011


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')