CVE-2022-48889

Source
https://cve.org/CVERecord?id=CVE-2022-48889
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48889.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48889
Downstream
Related
Published
2024-08-21T06:10:21.195Z
Modified
2026-03-20T12:21:59.467018Z
Summary
ASoC: Intel: sof-nau8825: fix module alias overflow
Details

In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: sof-nau8825: fix module alias overflow

The maximum name length for a platformdeviceid entry is 20 characters including the trailing NUL byte. The sof_nau8825.c file exceeds that, which causes an obscure error message:

sound/soc/intel/boards/snd-soc-sofnau8825.mod.c:35:45: error: illegal character encoding in string literal [-Werror,-Winvalid-source-encoding] MODULEALIAS("platform:adlmax98373nau8825<U+0018><AA>"); ^~~~ include/linux/module.h:168:49: note: expanded from macro 'MODULEALIAS' ^~~~~~ include/linux/module.h:165:56: note: expanded from macro 'MODULEINFO' ^~~~ include/linux/moduleparam.h:26:47: note: expanded from macro '__MODULE_INFO' = __MODULEINFOPREFIX __stringify(tag) "=" info

I could not figure out how to make the module handling robust enough to handle this better, but as a quick fix, using slightly shorter names that are still unique avoids the build issue.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48889.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8d0872f6239f9d067d538d8368bdec643bb0d255
Fixed
fba1b23befd88366fe646787b3797e64d7338fd2
Fixed
3e78986a840d59dd27e636eae3f52dc11125c835

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48889.json"