First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: soc-acpi-intel-rpl-match: add missing empty item There is no links_num in struct snd_soc_acpi_mach {}, and we test !link->num_adr as a condition to end the loop in hda_sdw_machine_select(). So an empty item in struct snd_soc_acpi_link_adr array is required.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.11<6.11.3 | |
Linux Kernel | =6.12-rc1 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50011 is considered to have a medium severity due to potential impacts on the Linux kernel functionality.
CVE-2024-50011 affects Linux kernel versions from 6.11 to 6.11.3 and version 6.12-rc1.
To fix CVE-2024-50011, upgrade to one of the patched versions such as 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.128-1, 6.12.12-1, or 6.12.13-1.
Failing to address CVE-2024-50011 may lead to stability issues or unexpected behavior in audio subsystems managed by the Linux kernel.
Yes, configurations using Intel SOC devices in conjunction with affected kernel versions may exacerbate the impact of CVE-2024-50011.