CVE-2024-38635

In the Linux kernel, the following vulnerability has been resolved: soundwire: cadence: fix invalid PDI offset For some reason, we add an offset to the PDI, presumably to skip the PDI0 and PDI1 which are reserved for BPT. This code is however completely wrong and leads to an out-of-bounds access. We were just lucky so far since we used only a couple of PDIs and remained within the PDI array bounds. A Fixes: tag is not provided since there are no known platforms where the out-of-bounds would be accessed, and the initial code had problems as well. A follow-up patch completely removes this useless offset.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Sep 2025, 17:00

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/002364b2d594a9afc0385c09e00994c510b1d089 - () https://git.kernel.org/stable/c/002364b2d594a9afc0385c09e00994c510b1d089 - Patch
References () https://git.kernel.org/stable/c/2ebcaa0e5db9b6044bb487ae1cf41bc601761567 - () https://git.kernel.org/stable/c/2ebcaa0e5db9b6044bb487ae1cf41bc601761567 - Patch
References () https://git.kernel.org/stable/c/4e99103f757cdf636c6ee860994a19a346a11785 - () https://git.kernel.org/stable/c/4e99103f757cdf636c6ee860994a19a346a11785 - Patch
References () https://git.kernel.org/stable/c/7eeef1e935d23db5265233d92395bd5c648a4021 - () https://git.kernel.org/stable/c/7eeef1e935d23db5265233d92395bd5c648a4021 - Patch
References () https://git.kernel.org/stable/c/8ee1b439b1540ae543149b15a2a61b9dff937d91 - () https://git.kernel.org/stable/c/8ee1b439b1540ae543149b15a2a61b9dff937d91 - Patch
References () https://git.kernel.org/stable/c/902f6d656441a511ac25c6cffce74496db10a078 - () https://git.kernel.org/stable/c/902f6d656441a511ac25c6cffce74496db10a078 - Patch
References () https://git.kernel.org/stable/c/fd4bcb991ebaf0d1813d81d9983cfa99f9ef5328 - () https://git.kernel.org/stable/c/fd4bcb991ebaf0d1813d81d9983cfa99f9ef5328 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-125
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
First Time Linux
Linux linux Kernel

21 Nov 2024, 09:26

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/002364b2d594a9afc0385c09e00994c510b1d089 - () https://git.kernel.org/stable/c/002364b2d594a9afc0385c09e00994c510b1d089 -
References () https://git.kernel.org/stable/c/2ebcaa0e5db9b6044bb487ae1cf41bc601761567 - () https://git.kernel.org/stable/c/2ebcaa0e5db9b6044bb487ae1cf41bc601761567 -
References () https://git.kernel.org/stable/c/4e99103f757cdf636c6ee860994a19a346a11785 - () https://git.kernel.org/stable/c/4e99103f757cdf636c6ee860994a19a346a11785 -
References () https://git.kernel.org/stable/c/7eeef1e935d23db5265233d92395bd5c648a4021 - () https://git.kernel.org/stable/c/7eeef1e935d23db5265233d92395bd5c648a4021 -
References () https://git.kernel.org/stable/c/8ee1b439b1540ae543149b15a2a61b9dff937d91 - () https://git.kernel.org/stable/c/8ee1b439b1540ae543149b15a2a61b9dff937d91 -
References () https://git.kernel.org/stable/c/902f6d656441a511ac25c6cffce74496db10a078 - () https://git.kernel.org/stable/c/902f6d656441a511ac25c6cffce74496db10a078 -
References () https://git.kernel.org/stable/c/fd4bcb991ebaf0d1813d81d9983cfa99f9ef5328 - () https://git.kernel.org/stable/c/fd4bcb991ebaf0d1813d81d9983cfa99f9ef5328 -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: soundwire: cadencia: corrige el desplazamiento de PDI no válido. Por alguna razón, agregamos un desplazamiento al PDI, presumiblemente para omitir el PDI0 y el PDI1 que están reservados para BPT. Sin embargo, este código es completamente erróneo y conduce a un acceso fuera de los límites. Hasta ahora tuvimos suerte ya que solo usamos un par de PDI y nos mantuvimos dentro de los límites de la matriz de PDI. No se proporciona una etiqueta de Correcciones: ya que no hay plataformas conocidas donde se pueda acceder a los límites, y el código inicial también tenía problemas. Un parche de seguimiento elimina por completo esta compensación inútil.

21 Jun 2024, 11:22

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-21 11:15

Updated : 2025-09-17 17:00


NVD link : CVE-2024-38635

Mitre link : CVE-2024-38635

CVE.ORG link : CVE-2024-38635


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read