In the Linux kernel, the following vulnerability has been resolved:
ALSA: core: Fix NULL module pointer assignment at card init
The commit 81033c6b584b ("ALSA: core: Warn on empty module")
introduced a WARN_ON() for a NULL module pointer passed at snd_card
object creation, and it also wraps the code around it with '#ifdef
MODULE'. This works in most cases, but the devils are always in
details. "MODULE" is defined when the target code (i.e. the sound
core) is built as a module; but this doesn't mean that the caller is
also built-in or not. Namely, when only the sound core is built-in
(CONFIG_SND=y) while the driver is a module (CONFIG_SND_USB_AUDIO=m),
the passed module pointer is ignored even if it's non-NULL, and
card->module remains as NULL. This would result in the missing module
reference up/down at the device open/close, leading to a race with the
code execution after the module removal.
For addressing the bug, move the assignment of card->module again out
of ifdef. The WARN_ON() is still wrapped with ifdef because the
module can be really NULL when all sound drivers are built-in.
Note that we keep 'ifdef MODULE' for WARN_ON(), otherwise it would
lead to a false-positive NULL module check. Admittedly it won't catch
perfectly, i.e. no check is performed when CONFIG_SND=y. But, it's no
real problem as it's only for debugging, and the condition is pretty
rare.
References
Configurations
Configuration 1 (hide)
|
History
01 Apr 2025, 18:26
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/39381fe7394e5eafac76e7e9367e7351138a29c1 - Patch | |
References | () https://git.kernel.org/stable/c/6b8374ee2cabcf034faa34e69a855dc496a9ec12 - Patch | |
References | () https://git.kernel.org/stable/c/c935e72139e6d523defd60fe875c01eb1f9ea5c5 - Patch | |
References | () https://git.kernel.org/stable/c/d7ff29a429b56f04783152ad7bbd7233b740e434 - Patch | |
References | () https://git.kernel.org/stable/c/e007476725730c1a68387b54b7629486d8a8301e - Patch | |
References | () https://git.kernel.org/stable/c/e644036a3e2b2c9b3eee3c61b5d31c2ca8b5ba92 - Patch | |
References | () https://git.kernel.org/stable/c/e7e0ca200772bdb2fdc6d43d32d341e87a36f811 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
21 Nov 2024, 09:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/39381fe7394e5eafac76e7e9367e7351138a29c1 - | |
References | () https://git.kernel.org/stable/c/6b8374ee2cabcf034faa34e69a855dc496a9ec12 - | |
References | () https://git.kernel.org/stable/c/c935e72139e6d523defd60fe875c01eb1f9ea5c5 - | |
References | () https://git.kernel.org/stable/c/d7ff29a429b56f04783152ad7bbd7233b740e434 - | |
References | () https://git.kernel.org/stable/c/e007476725730c1a68387b54b7629486d8a8301e - | |
References | () https://git.kernel.org/stable/c/e644036a3e2b2c9b3eee3c61b5d31c2ca8b5ba92 - | |
References | () https://git.kernel.org/stable/c/e7e0ca200772bdb2fdc6d43d32d341e87a36f811 - |
03 Jul 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | CWE-476 |
20 Jun 2024, 12:43
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Jun 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-19 14:15
Updated : 2025-04-01 18:26
NVD link : CVE-2024-38605
Mitre link : CVE-2024-38605
CVE.ORG link : CVE-2024-38605
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference