Wind River Support Network

HomeDefectsLIN1023-11621
Fixed

LIN1023-11621 : Security Advisory - linux - CVE-2024-58077

Created: Mar 6, 2025    Updated: Mar 24, 2025
Resolved Date: Mar 24, 2025
Found In Version: 10.23.30.1
Severity: Standard
Applicable for: Wind River Linux LTS 23
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:

ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback

commit 1f5664351410 ("ASoC: lower "no backend DAIs enabled for ... Port"
log severity") ignores -EINVAL error message on common soc_pcm_ret().
It is used from many functions, ignoring -EINVAL is over-kill.

The reason why -EINVAL was ignored was it really should only be used
upon invalid parameters coming from userspace and in that case we don't
want to log an error since we do not want to give userspace a way to do
a denial-of-service attack on the syslog / diskspace.

So don't use soc_pcm_ret() on .prepare callback is better idea.

CREATE(Triage):(User=admin) CVE-2024-58077 (https://nvd.nist.gov/vuln/detail/CVE-2024-58077)

CVEs


Live chat
Online