Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-58077— ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback

EPSS 0.03% · P9

Affected Version Matrix 10

VendorProductVersion RangeStatus
LinuxLinux1f566435141047ca7db26aa4b0b6647a25badaee< 79b8c7c93beb4f5882c9ee5b9ba73354fa4bc9eeaffected
1f566435141047ca7db26aa4b0b6647a25badaee< 90778f31efdf44622065ebbe8d228284104bd26faffected
1f566435141047ca7db26aa4b0b6647a25badaee< 8ec4e8c8e142933eaa8e1ed87168831069250e4eaffected
1f566435141047ca7db26aa4b0b6647a25badaee< 301c26a018acb94dd537a4418cefa0f654500c6faffected
6.5affected
< 6.5unaffected
6.6.78≤ 6.6.*unaffected
6.12.14≤ 6.12.*unaffected
… +2 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-58077

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback commit 1f5664351410 ("ASoC: lower "no backend DAIs enabled for ... Port" log severity") ignores -EINVAL error message on common soc_pcm_ret(). It is used from many functions, ignoring -EINVAL is over-kill. The reason why -EINVAL was ignored was it really should only be used upon invalid parameters coming from userspace and in that case we don't want to log an error since we do not want to give userspace a way to do a denial-of-service attack on the syslog / diskspace. So don't use soc_pcm_ret() on .prepare callback is better idea.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于在.prepare回调中不应使用soc_pcm_ret,可能导致错误日志记录。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 1f566435141047ca7db26aa4b0b6647a25badaee ~ 79b8c7c93beb4f5882c9ee5b9ba73354fa4bc9ee -
LinuxLinux 6.5 -

II. Public POCs for CVE-2024-58077

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-58077

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-03-06 · 46 CVEs total

CVE-2024-58063wifi: rtlwifi: fix memory leaks and invalid access at probe error path
CVE-2024-58060bpf: Reject struct_ops registration that uses module ptr and the module btf_id is missing
CVE-2024-58058ubifs: skip dumping tnc tree when zroot is null
CVE-2024-58055usb: gadget: f_tcm: Don't free command immediately
CVE-2024-58053rxrpc: Fix handling of received connection abort
CVE-2024-58054staging: media: max96712: fix kernel oops when removing module
CVE-2024-58052drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table
CVE-2024-58051ipmi: ipmb: Add check devm_kasprintf() returned value
CVE-2024-58056remoteproc: core: Fix ida_free call while not allocated
CVE-2024-58062wifi: iwlwifi: mvm: avoid NULL pointer dereference
CVE-2024-58061wifi: mac80211: prohibit deactivating all links
CVE-2024-58064wifi: cfg80211: tests: Fix potential NULL dereference in test_cfg80211_parse_colocated_ap(
CVE-2024-58065clk: mmp: pxa1908-apbc: Fix NULL vs IS_ERR() check
CVE-2024-58066clk: mmp: pxa1908-apbcp: Fix a NULL vs IS_ERR() check
CVE-2024-58067clk: mmp: pxa1908-mpmu: Fix a NULL vs IS_ERR() check
CVE-2024-58069rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
CVE-2024-58068OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized
CVE-2024-58070bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT
CVE-2024-58071team: prevent adding a device which is already a team device lower
CVE-2024-58072wifi: rtlwifi: remove unused check_buddy_priv

Showing top 20 of 46 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2024-58077

No comments yet


Leave a comment