Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension If a process module does not have base config extension then the same format applies to all of it's inputs and the process->base_config_ext is NULL, causing NULL dereference when specifically crafted topology and sequences used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 6.4 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/9e16f17a2a0e97b43538b272e7071537a3e03368Mailing ListPatch
- https://git.kernel.org/stable/c/e3ae00ee238bce6cfa5ad935c921181c14d18fd6Mailing ListPatch
- https://git.kernel.org/stable/c/ffa077b2f6ad124ec3d23fbddc5e4b0ff2647af8Mailing ListPatch
- https://git.kernel.org/stable/c/9e16f17a2a0e97b43538b272e7071537a3e03368Mailing ListPatch
- https://git.kernel.org/stable/c/e3ae00ee238bce6cfa5ad935c921181c14d18fd6Mailing ListPatch
- https://git.kernel.org/stable/c/ffa077b2f6ad124ec3d23fbddc5e4b0ff2647af8Mailing ListPatch
FAQ
What is CVE-2024-39473?
CVE-2024-39473 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension If a process module does not have base ...
How severe is CVE-2024-39473?
CVE-2024-39473 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-39473?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.