Bug 2337101 (CVE-2024-57805) - CVE-2024-57805 kernel: ASoC: SOF: Intel: hda-dai: Do not release the link DMA on STOP
Summary: CVE-2024-57805 kernel: ASoC: SOF: Intel: hda-dai: Do not release the link DMA...
Keywords:
Status: NEW
Alias: CVE-2024-57805
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-01-11 13:01 UTC by OSIDB Bzimport
Modified: 2025-01-20 15:32 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-01-11 13:01:44 UTC
In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: Intel: hda-dai: Do not release the link DMA on STOP

The linkDMA should not be released on stop trigger since a stream re-start
might happen without closing of the stream. This leaves a short time for
other streams to 'steal' the linkDMA since it has been released.

This issue is not easy to reproduce under normal conditions as usually
after stop the stream is closed, or the same stream is restarted, but if
another stream got in between the stop and start, like this:
aplay -Dhw:0,3 -c2 -r48000 -fS32_LE /dev/zero -d 120
CTRL+z
aplay -Dhw:0,0 -c2 -r48000 -fS32_LE /dev/zero -d 120

then the link DMA channels will be mixed up, resulting firmware error or
crash.

Comment 1 Avinash Hanwate 2025-01-13 08:12:45 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025011152-CVE-2024-57805-fbae@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.