CVE-2024-41069

In the Linux kernel, the following vulnerability has been resolved: ASoC: topology: Fix references to freed memory Most users after parsing a topology file, release memory used by it, so having pointer references directly into topology file contents is wrong. Use devm_kmemdup(), to allocate memory as needed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*

History

02 Oct 2025, 01:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.1
v2 : unknown
v3 : 7.8

26 Sep 2025, 14:41

Type Values Removed Values Added
CWE CWE-416
References () https://git.kernel.org/stable/c/97ab304ecd95c0b1703ff8c8c3956dc6e2afe8e1 - () https://git.kernel.org/stable/c/97ab304ecd95c0b1703ff8c8c3956dc6e2afe8e1 - Patch
References () https://git.kernel.org/stable/c/ab5a6208b4d6872b1c6ecea1867940fc668cc76d - () https://git.kernel.org/stable/c/ab5a6208b4d6872b1c6ecea1867940fc668cc76d - Patch
References () https://git.kernel.org/stable/c/b188d7f3dfab10e332e3c1066e18857964a520d2 - () https://git.kernel.org/stable/c/b188d7f3dfab10e332e3c1066e18857964a520d2 - Patch
References () https://git.kernel.org/stable/c/ccae5c6a1fab9494c86b7856faf05e296c617702 - () https://git.kernel.org/stable/c/ccae5c6a1fab9494c86b7856faf05e296c617702 - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
First Time Linux
Linux linux Kernel

21 Nov 2024, 09:32

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: ASoC: topología: corrige referencias a la memoria liberada. La mayoría de los usuarios, después de analizar un archivo de topología, liberan la memoria utilizada por este, por lo que tener referencias de puntero directamente al contenido del archivo de topología es incorrecto. Utilice devm_kmemdup() para asignar memoria según sea necesario.
References () https://git.kernel.org/stable/c/97ab304ecd95c0b1703ff8c8c3956dc6e2afe8e1 - () https://git.kernel.org/stable/c/97ab304ecd95c0b1703ff8c8c3956dc6e2afe8e1 -
References () https://git.kernel.org/stable/c/ab5a6208b4d6872b1c6ecea1867940fc668cc76d - () https://git.kernel.org/stable/c/ab5a6208b4d6872b1c6ecea1867940fc668cc76d -
References () https://git.kernel.org/stable/c/b188d7f3dfab10e332e3c1066e18857964a520d2 - () https://git.kernel.org/stable/c/b188d7f3dfab10e332e3c1066e18857964a520d2 -
References () https://git.kernel.org/stable/c/ccae5c6a1fab9494c86b7856faf05e296c617702 - () https://git.kernel.org/stable/c/ccae5c6a1fab9494c86b7856faf05e296c617702 -

29 Jul 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 15:15

Updated : 2025-10-02 01:44


NVD link : CVE-2024-41069

Mitre link : CVE-2024-41069

CVE.ORG link : CVE-2024-41069


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free