CVE-2024-57805
Vulnerability Scoring
Attack Complexity Details
- Attack Complexity: Analysis in progress
- Attack Vector: Analysis in progress
- Privileges Required: Analysis in progress
CIA Impact Definition
- Confidentiality:
- Integrity:
- Availability:
CVE-2024-57805 Vulnerability Summary
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda-dai: Do not release the link DMA on STOP The linkDMA should not be released on stop trigger since a stream re-start might happen without closing of the stream. This leaves a short time for other streams to 'steal' the linkDMA since it has been released. This issue is not easy to reproduce under normal conditions as usually after stop the stream is closed, or the same stream is restarted, but if another stream got in between the stop and start, like this: aplay -Dhw:0,3 -c2 -r48000 -fS32_LE /dev/zero -d 120 CTRL+z aplay -Dhw:0,0 -c2 -r48000 -fS32_LE /dev/zero -d 120 then the link DMA channels will be mixed up, resulting firmware error or crash.
Access Complexity Graph for CVE-2024-57805
Impact Analysis for CVE-2024-57805
CVE-2024-57805: Detailed Information and External References
EPSS
0.00043
EPSS %
0.11479
References
0.00043
- https://git.kernel.org/stable/c/909ecf15cb70f78cdb5c930f58df01db039a0ff8
- https://git.kernel.org/stable/c/e8d0ba147d901022bcb69da8d8fd817f84e9f3ca
CWE
Unknown
Protect Your Infrastructure: Combat Critical CVE Threats
Stay updated with real-time CVE vulnerabilities and take action to secure your systems. Enhance your cybersecurity posture with the latest threat intelligence and mitigation techniques. Develop the skills necessary to defend against CVEs and secure critical infrastructures. Join the top cybersecurity professionals safeguarding today's infrastructures.