CVE-2024-58077
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/03/2025
Last modified:
19/06/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ASoC: soc-pcm: don&#39;t use soc_pcm_ret() on .prepare callback<br />
<br />
commit 1f5664351410 ("ASoC: lower "no backend DAIs enabled for ... Port"<br />
log severity") ignores -EINVAL error message on common soc_pcm_ret().<br />
It is used from many functions, ignoring -EINVAL is over-kill.<br />
<br />
The reason why -EINVAL was ignored was it really should only be used<br />
upon invalid parameters coming from userspace and in that case we don&#39;t<br />
want to log an error since we do not want to give userspace a way to do<br />
a denial-of-service attack on the syslog / diskspace.<br />
<br />
So don&#39;t use soc_pcm_ret() on .prepare callback is better idea.