CVE-2024-27057

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-27057
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27057.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-27057
Downstream
Related
Published
2024-05-01T12:54:59Z
Modified
2025-10-17T02:15:43.788167Z
Summary
ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend
Details

In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend

When the system is suspended while audio is active, the sofipc4pcmhwfree() is invoked to reset the pipelines since during suspend the DSP is turned off, streams will be re-started after resume.

If the firmware crashes during while audio is running (or when we reset the stream before suspend) then the sofipc4setmultipipeline_state() will fail with IPC error and the state change is interrupted. This will cause misalignment between the kernel and firmware state on next DSP boot resulting errors returned by firmware for IPC messages, eventually failing the audio resume. On stream close the errors are ignored so the kernel state will be corrected on the next DSP boot, so the second boot after the DSP panic.

If sofipc4triggerpipelines() is called from sofipc4pcmhwfree() then state parameter is SOFIPC4PIPERESET and only in this case.

Treat a forced pipeline reset similarly to how we treat a pcm_free by ignoring error on state sending to allow the kernel's state to be consistent with the state the firmware will have after the next boot.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ceb89acc4dc8f071f63f8d64442c7a5d768e4c9d
Fixed
3cac6eebea9b4bc5f041e157e45c76e212ad6759
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ceb89acc4dc8f071f63f8d64442c7a5d768e4c9d
Fixed
d153e8b154f9746ac969c85a4e6474760453647c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ceb89acc4dc8f071f63f8d64442c7a5d768e4c9d
Fixed
c40aad7c81e5fba34b70123ed7ce3397fa62a4d2

Affected versions

v5.*

v5.18
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.3
v6.6.4
v6.6.5
v6.6.6
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.7.1
v6.7.10
v6.7.2
v6.7.3
v6.7.4
v6.7.5
v6.7.6
v6.7.7
v6.7.8
v6.7.9
v6.8-rc1
v6.8-rc2

Database specific

vanir_signatures

[
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d153e8b154f9746ac969c85a4e6474760453647c",
        "signature_version": "v1",
        "target": {
            "function": "sof_ipc4_trigger_pipelines",
            "file": "sound/soc/sof/ipc4-pcm.c"
        },
        "digest": {
            "function_hash": "40673525281958297531143671062693969098",
            "length": 2217.0
        },
        "id": "CVE-2024-27057-1ffd696b"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c40aad7c81e5fba34b70123ed7ce3397fa62a4d2",
        "signature_version": "v1",
        "target": {
            "function": "sof_ipc4_trigger_pipelines",
            "file": "sound/soc/sof/ipc4-pcm.c"
        },
        "digest": {
            "function_hash": "40673525281958297531143671062693969098",
            "length": 2217.0
        },
        "id": "CVE-2024-27057-48765dd5"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d153e8b154f9746ac969c85a4e6474760453647c",
        "signature_version": "v1",
        "target": {
            "file": "sound/soc/sof/ipc4-pcm.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "202015829021477508877738601549202956624",
                "167307063197146251861066336978711263936",
                "69747163302968915891685712027169375674",
                "25187692175986947635492626489292911291"
            ]
        },
        "id": "CVE-2024-27057-4bea71f3"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c40aad7c81e5fba34b70123ed7ce3397fa62a4d2",
        "signature_version": "v1",
        "target": {
            "file": "sound/soc/sof/ipc4-pcm.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "202015829021477508877738601549202956624",
                "167307063197146251861066336978711263936",
                "69747163302968915891685712027169375674",
                "25187692175986947635492626489292911291"
            ]
        },
        "id": "CVE-2024-27057-d9e78a12"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3cac6eebea9b4bc5f041e157e45c76e212ad6759",
        "signature_version": "v1",
        "target": {
            "file": "sound/soc/sof/ipc4-pcm.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "202015829021477508877738601549202956624",
                "167307063197146251861066336978711263936",
                "69747163302968915891685712027169375674",
                "25187692175986947635492626489292911291"
            ]
        },
        "id": "CVE-2024-27057-e5a82b83"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3cac6eebea9b4bc5f041e157e45c76e212ad6759",
        "signature_version": "v1",
        "target": {
            "function": "sof_ipc4_trigger_pipelines",
            "file": "sound/soc/sof/ipc4-pcm.c"
        },
        "digest": {
            "function_hash": "152390345423996299546718318141941704798",
            "length": 2071.0
        },
        "id": "CVE-2024-27057-e7c0cf0c"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.19.0
Fixed
6.6.23
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.11