CVE-2024-56657
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/12/2024
Last modified:
06/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ALSA: control: Avoid WARN() for symlink errors<br />
<br />
Using WARN() for showing the error of symlink creations don&#39;t give<br />
more information than telling that something goes wrong, since the<br />
usual code path is a lregister callback from each control element<br />
creation. More badly, the use of WARN() rather confuses fuzzer as if<br />
it were serious issues.<br />
<br />
This patch downgrades the warning messages to use the normal dev_err()<br />
instead of WARN(). For making it clearer, add the function name to<br />
the prefix, too.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13 (including) | 6.6.67 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.6 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page