摘要:
In the Linux kernel, the following vulnerability has been resolved:ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extensionIf a process module does not have base config extension then the sameformat applies to all of it s inputs and the process->base_config_ext isNULL, causing NULL dereference when specifically crafted topology andsequences used.
安全等级: Low
公告ID: KylinSec-SA-2024-3258
发布日期: 2024年8月1日
关联CVE: CVE-2024-39473
In the Linux kernel, the following vulnerability has been resolved:ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extensionIf a process module does not have base config extension then the sameformat applies to all of it s inputs and the process->base_config_ext isNULL, causing NULL dereference when specifically crafted topology andsequences used.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-39473 | KY3.4-5A | kernel | Unaffected |
CVE-2024-39473 | KY3.5.2 | kernel | Unaffected |