CVE-2024-58077

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-58077
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-58077.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-58077
Downstream
Related
Published
2025-03-06T17:15:21Z
Modified
2025-08-09T19:01:28Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

ASoC: soc-pcm: don't use socpcmret() on .prepare callback

commit 1f5664351410 ("ASoC: lower "no backend DAIs enabled for ... Port" log severity") ignores -EINVAL error message on common socpcmret(). It is used from many functions, ignoring -EINVAL is over-kill.

The reason why -EINVAL was ignored was it really should only be used upon invalid parameters coming from userspace and in that case we don't want to log an error since we do not want to give userspace a way to do a denial-of-service attack on the syslog / diskspace.

So don't use socpcmret() on .prepare callback is better idea.

References

Affected packages