ghsa-4rx2-3f77-xv9x
Vulnerability from github
Published
2024-05-17 15:31
Modified
2024-05-17 15:31
Details
In the Linux kernel, the following vulnerability has been resolved:
ASoC: Intel: sof_sdw_rt_sdca_jack_common: ctx->headset_codec_dev = NULL
sof_sdw_rt_sdca_jack_exit() are used by different codecs, and some of them use the same dai name. For example, rt712 and rt713 both use "rt712-sdca-aif1" and sof_sdw_rt_sdca_jack_exit(). As a result, sof_sdw_rt_sdca_jack_exit() will be called twice by mc_dailink_exit_loop(). Set ctx->headset_codec_dev = NULL; after put_device(ctx->headset_codec_dev); to avoid ctx->headset_codec_dev being put twice.
{ "affected": [], "aliases": [ "CVE-2023-52697" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-05-17T15:15:20Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: sof_sdw_rt_sdca_jack_common: ctx-\u003eheadset_codec_dev = NULL\n\nsof_sdw_rt_sdca_jack_exit() are used by different codecs, and some of\nthem use the same dai name.\nFor example, rt712 and rt713 both use \"rt712-sdca-aif1\" and\nsof_sdw_rt_sdca_jack_exit().\nAs a result, sof_sdw_rt_sdca_jack_exit() will be called twice by\nmc_dailink_exit_loop(). Set ctx-\u003eheadset_codec_dev = NULL; after\nput_device(ctx-\u003eheadset_codec_dev); to avoid ctx-\u003eheadset_codec_dev\nbeing put twice.", "id": "GHSA-4rx2-3f77-xv9x", "modified": "2024-05-17T15:31:11Z", "published": "2024-05-17T15:31:11Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52697" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/582231a8c4f73ac153493687ecc1bed853e9c9ef" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/a410d58117d6da4b7d41f3c91365f191d006bc3d" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/e38e252dbceeef7d2f848017132efd68e9ae1416" } ], "schema_version": "1.4.0", "severity": [] }
Loading...