CVE-2024-26799

Severity CVSS v4.0:
Pending analysis
Type:
CWE-824 Access of Uninitialized Pointer
Publication date:
04/04/2024
Last modified:
04/04/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ASoC: qcom: Fix uninitialized pointer dmactl<br /> <br /> In the case where __lpass_get_dmactl_handle is called and the driver<br /> id dai_id is invalid the pointer dmactl is not being assigned a value,<br /> and dmactl contains a garbage value since it has not been initialized<br /> and so the null check may not work. Fix this to initialize dmactl to<br /> NULL. One could argue that modern compilers will set this to zero, but<br /> it is useful to keep this initialized as per the same way in functions<br /> __lpass_platform_codec_intf_init and lpass_cdc_dma_daiops_hw_params.<br /> <br /> Cleans up clang scan build warning:<br /> sound/soc/qcom/lpass-cdc-dma.c:275:7: warning: Branch condition<br /> evaluates to a garbage value [core.uninitialized.Branch]

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.18 (including) 6.6.21 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.9 (excluding)
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*