We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-41037

ASoC: SOF: Intel: hda: fix null deref on system suspend entry



AssignerLinux
Reserved2024-07-12
Published2024-07-29
Updated2024-09-11

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda: fix null deref on system suspend entry When system enters suspend with an active stream, SOF core calls hw_params_upon_resume(). On Intel platforms with HDA DMA used to manage the link DMA, this leads to call chain of hda_dsp_set_hw_params_upon_resume() -> hda_dsp_dais_suspend() -> hda_dai_suspend() -> hda_ipc4_post_trigger() A bug is hit in hda_dai_suspend() as hda_link_dma_cleanup() is run first, which clears hext_stream->link_substream, and then hda_ipc4_post_trigger() is called with a NULL snd_pcm_substream pointer.

Product status

Default status
0x40046bbbf0

2b009fa0823c before 8246bbf818ed
affected

2b009fa0823c before 993af0f2d9f2
affected

2b009fa0823c before 9065693dcc13
affected

Default status
0x40046bbca0

6.4
affected

Any version before 6.4
unaffected

6.6.41
unaffected

6.9.10
unaffected

6.10
unaffected

References

https://git.kernel.org/stable/c/8246bbf818ed7b8d5afc92b951e6d562b45c2450

https://git.kernel.org/stable/c/993af0f2d9f24e3c18a445ae22b34190d1fcad61

https://git.kernel.org/stable/c/9065693dcc13f287b9e4991f43aee70cf5538fdd

cve.org CVE-2024-41037

nvd.nist.gov CVE-2024-41037

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-41037
Subscribe to our newsletter to learn more about our work.