In the Linux kernel, the following vulnerability has been resolved:
ASoC: Intel: avs: Fix potential RX buffer overflow
If an event caused firmware to return invalid RX size for
LARGE_CONFIG_GET, memcpy_fromio() could end up copying too many bytes.
Fix by utilizing min_t().
ASoC: Intel: avs: Fix potential RX buffer overflow
If an event caused firmware to return invalid RX size for
LARGE_CONFIG_GET, memcpy_fromio() could end up copying too many bytes.
Fix by utilizing min_t().
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 15 Sep 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: avs: Fix potential RX buffer overflow If an event caused firmware to return invalid RX size for LARGE_CONFIG_GET, memcpy_fromio() could end up copying too many bytes. Fix by utilizing min_t(). | |
Title | ASoC: Intel: avs: Fix potential RX buffer overflow | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-09-15T14:49:19.788Z
Reserved: 2025-09-15T14:18:36.815Z
Link: CVE-2022-50325

No data.

Status : Awaiting Analysis
Published: 2025-09-15T15:15:44.600
Modified: 2025-09-15T15:22:27.090
Link: CVE-2022-50325

No data.

No data.