In the Linux kernel, the following vulnerability has been resolved:
ASoC: Intel: avs: Fix potential buffer overflow by snprintf()
snprintf() returns the would-be-filled size when the string overflows the given buffer size, hence using this value may result in a buffer overflow (although it's unrealistic).
This patch replaces it with a safer version, scnprintf() for papering over such a potential issue.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ca3b7b9dc9bc1fa552f4697b7cccfa0258a44d00",
"deprecated": false,
"digest": {
"line_hashes": [
"18094358285949125156685640511958520854",
"319925860291603014337297262848811564870",
"186789772448050164798495148083265002910",
"245911522132221502338830347804210766561",
"76339753255650095891093093857798243839"
],
"threshold": 0.9
},
"target": {
"file": "sound/soc/intel/avs/pcm.c"
},
"id": "CVE-2022-50052-d914302e",
"signature_version": "v1",
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@840311a09f75632b9d41fbc1cd5c7aea94ce5f7e",
"deprecated": false,
"digest": {
"line_hashes": [
"18094358285949125156685640511958520854",
"319925860291603014337297262848811564870",
"186789772448050164798495148083265002910",
"245911522132221502338830347804210766561",
"76339753255650095891093093857798243839"
],
"threshold": 0.9
},
"target": {
"file": "sound/soc/intel/avs/pcm.c"
},
"id": "CVE-2022-50052-de45276a",
"signature_version": "v1",
"signature_type": "Line"
}
]