We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-53045

ASoC: dapm: fix bounds checker error in dapm_widget_list_create



AssignerLinux
Reserved2024-11-19
Published2024-11-19
Updated2024-11-19

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: dapm: fix bounds checker error in dapm_widget_list_create The widgets array in the snd_soc_dapm_widget_list has a __counted_by attribute attached to it, which points to the num_widgets variable. This attribute is used in bounds checking, and if it is not set before the array is filled, then the bounds sanitizer will issue a warning or a kernel panic if CONFIG_UBSAN_TRAP is set. This patch sets the size of the widgets list calculated with list_for_each as the initial value for num_widgets as it is used for allocating memory for the array. It is updated with the actual number of added elements after the array is filled.

Product status

Default status
unaffected

80e698e2df5b before c549cb66e8de
affected

80e698e2df5b before 2ef9439f7a19
affected

Default status
affected

6.7
affected

Any version before 6.7
unaffected

6.11.7
unaffected

6.12
unaffected

References

https://git.kernel.org/stable/c/c549cb66e8de0ba1936fc97a59f0156741d3492a

https://git.kernel.org/stable/c/2ef9439f7a19fd3d43b288d38b1c6e55b668a4fe

cve.org CVE-2024-53045

nvd.nist.gov CVE-2024-53045

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-53045
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.