{"id":"CVE-2022-50325","summary":"ASoC: Intel: avs: Fix potential RX buffer overflow","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: avs: Fix potential RX buffer overflow\n\nIf an event caused firmware to return invalid RX size for\nLARGE_CONFIG_GET, memcpy_fromio() could end up copying too many bytes.\nFix by utilizing min_t().","modified":"2026-04-02T08:28:25.653950Z","published":"2025-09-15T14:49:19.788Z","related":["SUSE-SU-2025:03615-1","SUSE-SU-2025:3761-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50325.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0bad12fee5ae16ab439d97c66c4238f5f4cc7f68"},{"type":"WEB","url":"https://git.kernel.org/stable/c/23ae34e033b2c0e5e88237af82b163b296fd6aa9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ec1f0c12cb2e614c3fa8e9402f7ffcf82166078a"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50325.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50325"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f14a1c5a9f830025dc8638303ddefd5f731ae4bc"},{"fixed":"ec1f0c12cb2e614c3fa8e9402f7ffcf82166078a"},{"fixed":"0bad12fee5ae16ab439d97c66c4238f5f4cc7f68"},{"fixed":"23ae34e033b2c0e5e88237af82b163b296fd6aa9"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50325.json"}}],"schema_version":"1.7.5"}