CVE-2024-50011

medium

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: soc-acpi-intel-rpl-match: add missing empty item There is no links_num in struct snd_soc_acpi_mach {}, and we test !link->num_adr as a condition to end the loop in hda_sdw_machine_select(). So an empty item in struct snd_soc_acpi_link_adr array is required.

References

https://git.kernel.org/stable/c/aa3109ee91fe09e696274e6ac44813df8d13678f

https://git.kernel.org/stable/c/5afc29ba44fdd1bcbad4e07246c395d946301580

Details

Source: Mitre, NVD

Published: 2024-10-21

Updated: 2024-11-01

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium