Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m645-99m8-4hcp

Опубликовано: 11 сент. 2025
Источник: github
Github: Не прошло ревью

Описание

In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control

The 'sprintf' call in 'add_tuning_control' may exceed the 44-byte buffer if either string argument is too long. This triggers a compiler warning. Replaced 'sprintf' with 'snprintf' to limit string lengths to prevent overflow.

In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control

The 'sprintf' call in 'add_tuning_control' may exceed the 44-byte buffer if either string argument is too long. This triggers a compiler warning. Replaced 'sprintf' with 'snprintf' to limit string lengths to prevent overflow.

Связанные уязвимости

ubuntu
3 месяца назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

CVSS3: 7
redhat
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control The 'sprintf' call in 'add_tuning_control' may exceed the 44-byte buffer if either string argument is too long. This triggers a compiler warning. Replaced 'sprintf' with 'snprintf' to limit string lengths to prevent overflow.

nvd
3 месяца назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

msrc
3 месяца назад

ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control

CVSS3: 4.5
fstec
6 месяцев назад

Уязвимость функции add_tuning_control компонента sound/pci/hda/patch_ca0132.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании