In the Linux kernel, the following vulnerability has been resolved: ALSA: hda/ca0132: fixup buffer overrun at tuningctlset() tuningctlset() might have buffer overrun at (X) if it didn't break from loop by matching (A). static int tuningctlset(...) { for (i = 0; i < TUNINGCTLSCOUNT; i++) (A) if (nid == ca0132tuningctls[i].nid) break; sndhdapowerup(...); (X) dspiosetparam(..., ca0132tuningctls[i].mid, ...); sndhdapowerdown(...); ^ return 1; } We will get below error by cppcheck sound/pci/hda/patchca0132.c:4229:2: note: After for loop, i has value 12 for (i = 0; i < TUNINGCTLSCOUNT; i++) ^ sound/pci/hda/patchca0132.c:4234:43: note: Array index out of bounds dspiosetparam(codec, ca0132tuningctls[i].mid, 0x20, ^ This patch cares non match case.