In the Linux kernel, the following vulnerability has been resolved:ASoC: SOF: debug: Fix potential buffer overflow by snprintf()snprintf() returns the would-be-filled size when the string overflowsthe given buffer size, hence using this value may result in the bufferoverflow (although it's unrealistic).This patch replaces with a safer version, scnprintf() for paperingover such a potential issue.
No PoCs from references.
- https://github.com/ARPSyndicate/cve-scores