CVE-2024-38605
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
19/06/2024
Last modified:
01/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ALSA: core: Fix NULL module pointer assignment at card init<br />
<br />
The commit 81033c6b584b ("ALSA: core: Warn on empty module")<br />
introduced a WARN_ON() for a NULL module pointer passed at snd_card<br />
object creation, and it also wraps the code around it with &#39;#ifdef<br />
MODULE&#39;. This works in most cases, but the devils are always in<br />
details. "MODULE" is defined when the target code (i.e. the sound<br />
core) is built as a module; but this doesn&#39;t mean that the caller is<br />
also built-in or not. Namely, when only the sound core is built-in<br />
(CONFIG_SND=y) while the driver is a module (CONFIG_SND_USB_AUDIO=m),<br />
the passed module pointer is ignored even if it&#39;s non-NULL, and<br />
card->module remains as NULL. This would result in the missing module<br />
reference up/down at the device open/close, leading to a race with the<br />
code execution after the module removal.<br />
<br />
For addressing the bug, move the assignment of card->module again out<br />
of ifdef. The WARN_ON() is still wrapped with ifdef because the<br />
module can be really NULL when all sound drivers are built-in.<br />
<br />
Note that we keep &#39;ifdef MODULE&#39; for WARN_ON(), otherwise it would<br />
lead to a false-positive NULL module check. Admittedly it won&#39;t catch<br />
perfectly, i.e. no check is performed when CONFIG_SND=y. But, it&#39;s no<br />
real problem as it&#39;s only for debugging, and the condition is pretty<br />
rare.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.9 (including) | 5.10.219 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.161 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.93 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.33 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.9 (including) | 6.9.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/39381fe7394e5eafac76e7e9367e7351138a29c1
- https://git.kernel.org/stable/c/6b8374ee2cabcf034faa34e69a855dc496a9ec12
- https://git.kernel.org/stable/c/c935e72139e6d523defd60fe875c01eb1f9ea5c5
- https://git.kernel.org/stable/c/d7ff29a429b56f04783152ad7bbd7233b740e434
- https://git.kernel.org/stable/c/e007476725730c1a68387b54b7629486d8a8301e
- https://git.kernel.org/stable/c/e644036a3e2b2c9b3eee3c61b5d31c2ca8b5ba92
- https://git.kernel.org/stable/c/e7e0ca200772bdb2fdc6d43d32d341e87a36f811
- https://git.kernel.org/stable/c/39381fe7394e5eafac76e7e9367e7351138a29c1
- https://git.kernel.org/stable/c/6b8374ee2cabcf034faa34e69a855dc496a9ec12
- https://git.kernel.org/stable/c/c935e72139e6d523defd60fe875c01eb1f9ea5c5
- https://git.kernel.org/stable/c/d7ff29a429b56f04783152ad7bbd7233b740e434
- https://git.kernel.org/stable/c/e007476725730c1a68387b54b7629486d8a8301e
- https://git.kernel.org/stable/c/e644036a3e2b2c9b3eee3c61b5d31c2ca8b5ba92
- https://git.kernel.org/stable/c/e7e0ca200772bdb2fdc6d43d32d341e87a36f811



