CVE-2024-57880

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-57880
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-57880.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-57880
Downstream
Related
Published
2025-01-11T15:05:28.763Z
Modified
2025-11-20T07:27:04.118483Z
Summary
ASoC: Intel: sof_sdw: Add space for a terminator into DAIs array
Details

In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: sof_sdw: Add space for a terminator into DAIs array

The code uses the initialised member of the asocsdwdailink struct to determine if a member of the array is in use. However in the case the array is completely full this will lead to an access 1 past the end of the array, expand the array by one entry to include a space for a terminator.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
27fd36aefa0013bea1cf6948e2e825e9b8cff97a
Fixed
b21a849764a4111b0bc14a5ffe987a0582419de2
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
27fd36aefa0013bea1cf6948e2e825e9b8cff97a
Fixed
255cc582e6e16191a20d54bcdbca6c91d3e90c5e

Affected versions

v6.*

v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.1
v6.12.2
v6.12.3
v6.12.4
v6.12.5
v6.13-rc1
v6.13-rc2
v6.9
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

vanir_signatures

[
    {
        "signature_type": "Line",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "154642671453337530570447073401371755584",
                "242688825273135351773083290661388134733",
                "144806161054262682049444638732938135299",
                "238204309950525564120452039274224173224"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "sound/soc/intel/boards/sof_sdw.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@255cc582e6e16191a20d54bcdbca6c91d3e90c5e",
        "signature_version": "v1",
        "id": "CVE-2024-57880-2d6308a8"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "digest": {
            "length": 2532.0,
            "function_hash": "155274533916760461950197590223157315650"
        },
        "target": {
            "file": "sound/soc/intel/boards/sof_sdw.c",
            "function": "sof_card_dai_links_create"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b21a849764a4111b0bc14a5ffe987a0582419de2",
        "signature_version": "v1",
        "id": "CVE-2024-57880-9d3d0c87"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "digest": {
            "length": 2532.0,
            "function_hash": "155274533916760461950197590223157315650"
        },
        "target": {
            "file": "sound/soc/intel/boards/sof_sdw.c",
            "function": "sof_card_dai_links_create"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@255cc582e6e16191a20d54bcdbca6c91d3e90c5e",
        "signature_version": "v1",
        "id": "CVE-2024-57880-b8a470e2"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "154642671453337530570447073401371755584",
                "242688825273135351773083290661388134733",
                "144806161054262682049444638732938135299",
                "238204309950525564120452039274224173224"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "sound/soc/intel/boards/sof_sdw.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b21a849764a4111b0bc14a5ffe987a0582419de2",
        "signature_version": "v1",
        "id": "CVE-2024-57880-f36fb5be"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.10.0
Fixed
6.12.6