CVE-2024-41069

Source
https://cve.org/CVERecord?id=CVE-2024-41069
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-41069.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-41069
Downstream
Related
Published
2024-07-29T14:57:30.245Z
Modified
2026-03-14T12:35:07.403224Z
Summary
ASoC: topology: Fix references to freed memory
Details

In the Linux kernel, the following vulnerability has been resolved:

ASoC: topology: Fix references to freed memory

Most users after parsing a topology file, release memory used by it, so having pointer references directly into topology file contents is wrong. Use devm_kmemdup(), to allocate memory as needed.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/41xxx/CVE-2024-41069.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7df04ea7a31eaa75bdad2905f07cc097b15558ee
Fixed
b188d7f3dfab10e332e3c1066e18857964a520d2
Fixed
ab5a6208b4d6872b1c6ecea1867940fc668cc76d
Fixed
ccae5c6a1fab9494c86b7856faf05e296c617702
Fixed
97ab304ecd95c0b1703ff8c8c3956dc6e2afe8e1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-41069.json"