๐Ÿ” CVE Alert

CVE-2024-58077

UNKNOWN 0.0

ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback commit 1f5664351410 ("ASoC: lower "no backend DAIs enabled for ... Port" log severity") ignores -EINVAL error message on common soc_pcm_ret(). It is used from many functions, ignoring -EINVAL is over-kill. The reason why -EINVAL was ignored was it really should only be used upon invalid parameters coming from userspace and in that case we don't want to log an error since we do not want to give userspace a way to do a denial-of-service attack on the syslog / diskspace. So don't use soc_pcm_ret() on .prepare callback is better idea.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 6, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1f566435141047ca7db26aa4b0b6647a25badaee < 79b8c7c93beb4f5882c9ee5b9ba73354fa4bc9ee 1f566435141047ca7db26aa4b0b6647a25badaee < 90778f31efdf44622065ebbe8d228284104bd26f 1f566435141047ca7db26aa4b0b6647a25badaee < 8ec4e8c8e142933eaa8e1ed87168831069250e4e 1f566435141047ca7db26aa4b0b6647a25badaee < 301c26a018acb94dd537a4418cefa0f654500c6f
Linux / Linux
6.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/79b8c7c93beb4f5882c9ee5b9ba73354fa4bc9ee git.kernel.org: https://git.kernel.org/stable/c/90778f31efdf44622065ebbe8d228284104bd26f git.kernel.org: https://git.kernel.org/stable/c/8ec4e8c8e142933eaa8e1ed87168831069250e4e git.kernel.org: https://git.kernel.org/stable/c/301c26a018acb94dd537a4418cefa0f654500c6f lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html