In the Linux kernel, the following vulnerability has been resolved:
ASoC: SOF: ipc4-mtrace: prevent underflow in sof_ipc4_priority_mask_dfs_write()
The "id" comes from the user. Change the type to unsigned to prevent
an array underflow.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Apr 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-191 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 02 Apr 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 27 Mar 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: ipc4-mtrace: prevent underflow in sof_ipc4_priority_mask_dfs_write() The "id" comes from the user. Change the type to unsigned to prevent an array underflow. | |
Title | ASoC: SOF: ipc4-mtrace: prevent underflow in sof_ipc4_priority_mask_dfs_write() | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-03-27T16:43:24.225Z
Reserved: 2025-03-27T16:40:15.741Z
Link: CVE-2023-52987

No data.

Status : Awaiting Analysis
Published: 2025-03-27T17:15:46.050
Modified: 2025-03-28T18:11:49.747
Link: CVE-2023-52987
