CVE-2024-43818

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-43818
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-43818.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-43818
Downstream
Related
Published
2024-08-17T09:21:40Z
Modified
2025-10-17T10:27:21.466488Z
Summary
ASoC: amd: Adjust error handling in case of absent codec device
Details

In the Linux kernel, the following vulnerability has been resolved:

ASoC: amd: Adjust error handling in case of absent codec device

acpigetfirstphysicalnode() can return NULL in several cases (no such device, ACPI table error, reference count drop to 0, etc). Existing check just emit error message, but doesn't perform return. Then this NULL pointer is passed to devmacpidevadddriver_gpios() where it is dereferenced.

Adjust this error handling by adding error code return.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
02527c3f2300100a25524c8c020d98c7957e485e
Fixed
1ba9856cf7f6492b47c1edf853137f320d583db5
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
02527c3f2300100a25524c8c020d98c7957e485e
Fixed
99b642dac24f6d09ba3ebf1d690be8aefff86164
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
02527c3f2300100a25524c8c020d98c7957e485e
Fixed
b1173d64edd276c957b6d09e1f971c85b38f1519
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
02527c3f2300100a25524c8c020d98c7957e485e
Fixed
5080808c3339de2220c602ab7c7fa23dc6c1a5a3

Affected versions

v5.*

v5.19
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.100
v6.1.101
v6.1.102
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.16
v6.1.17
v6.1.18
v6.1.19
v6.1.2
v6.1.20
v6.1.21
v6.1.22
v6.1.23
v6.1.24
v6.1.25
v6.1.26
v6.1.27
v6.1.28
v6.1.29
v6.1.3
v6.1.30
v6.1.31
v6.1.32
v6.1.33
v6.1.34
v6.1.35
v6.1.36
v6.1.37
v6.1.38
v6.1.39
v6.1.4
v6.1.40
v6.1.41
v6.1.42
v6.1.43
v6.1.44
v6.1.45
v6.1.46
v6.1.47
v6.1.48
v6.1.49
v6.1.5
v6.1.50
v6.1.51
v6.1.52
v6.1.53
v6.1.54
v6.1.55
v6.1.56
v6.1.57
v6.1.58
v6.1.59
v6.1.6
v6.1.60
v6.1.61
v6.1.62
v6.1.63
v6.1.64
v6.1.65
v6.1.66
v6.1.67
v6.1.68
v6.1.69
v6.1.7
v6.1.70
v6.1.71
v6.1.72
v6.1.73
v6.1.74
v6.1.75
v6.1.76
v6.1.77
v6.1.78
v6.1.79
v6.1.8
v6.1.80
v6.1.81
v6.1.82
v6.1.83
v6.1.84
v6.1.85
v6.1.86
v6.1.87
v6.1.88
v6.1.89
v6.1.9
v6.1.90
v6.1.91
v6.1.92
v6.1.93
v6.1.94
v6.1.95
v6.1.96
v6.1.97
v6.1.98
v6.1.99
v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.10.1
v6.10.2
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.24
v6.6.25
v6.6.26
v6.6.27
v6.6.28
v6.6.29
v6.6.3
v6.6.30
v6.6.31
v6.6.32
v6.6.33
v6.6.34
v6.6.35
v6.6.36
v6.6.37
v6.6.38
v6.6.39
v6.6.4
v6.6.40
v6.6.41
v6.6.42
v6.6.43
v6.6.5
v6.6.6
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

vanir_signatures

[
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@99b642dac24f6d09ba3ebf1d690be8aefff86164",
        "signature_version": "v1",
        "target": {
            "function": "st_es8336_late_probe",
            "file": "sound/soc/amd/acp-es8336.c"
        },
        "digest": {
            "function_hash": "317735692399322732652665270334884764573",
            "length": 632.0
        },
        "id": "CVE-2024-43818-001a33c3"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b1173d64edd276c957b6d09e1f971c85b38f1519",
        "signature_version": "v1",
        "target": {
            "file": "sound/soc/amd/acp-es8336.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "114731412444693289194812211638262502009",
                "191980669305678893551417027575628410262",
                "158803454357845718603818252518031510261",
                "131039815073858410937181543394939344874",
                "163281338214721212790067069668769232014"
            ]
        },
        "id": "CVE-2024-43818-15bf6c6e"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b1173d64edd276c957b6d09e1f971c85b38f1519",
        "signature_version": "v1",
        "target": {
            "function": "st_es8336_late_probe",
            "file": "sound/soc/amd/acp-es8336.c"
        },
        "digest": {
            "function_hash": "317735692399322732652665270334884764573",
            "length": 632.0
        },
        "id": "CVE-2024-43818-451e264f"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5080808c3339de2220c602ab7c7fa23dc6c1a5a3",
        "signature_version": "v1",
        "target": {
            "function": "st_es8336_late_probe",
            "file": "sound/soc/amd/acp-es8336.c"
        },
        "digest": {
            "function_hash": "317735692399322732652665270334884764573",
            "length": 632.0
        },
        "id": "CVE-2024-43818-9a26d1fd"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1ba9856cf7f6492b47c1edf853137f320d583db5",
        "signature_version": "v1",
        "target": {
            "file": "sound/soc/amd/acp-es8336.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "114731412444693289194812211638262502009",
                "191980669305678893551417027575628410262",
                "158803454357845718603818252518031510261",
                "131039815073858410937181543394939344874",
                "163281338214721212790067069668769232014"
            ]
        },
        "id": "CVE-2024-43818-d64735df"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5080808c3339de2220c602ab7c7fa23dc6c1a5a3",
        "signature_version": "v1",
        "target": {
            "file": "sound/soc/amd/acp-es8336.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "114731412444693289194812211638262502009",
                "191980669305678893551417027575628410262",
                "158803454357845718603818252518031510261",
                "131039815073858410937181543394939344874",
                "163281338214721212790067069668769232014"
            ]
        },
        "id": "CVE-2024-43818-d83bf2de"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1ba9856cf7f6492b47c1edf853137f320d583db5",
        "signature_version": "v1",
        "target": {
            "function": "st_es8336_late_probe",
            "file": "sound/soc/amd/acp-es8336.c"
        },
        "digest": {
            "function_hash": "317735692399322732652665270334884764573",
            "length": 632.0
        },
        "id": "CVE-2024-43818-e864c5a5"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@99b642dac24f6d09ba3ebf1d690be8aefff86164",
        "signature_version": "v1",
        "target": {
            "file": "sound/soc/amd/acp-es8336.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "114731412444693289194812211638262502009",
                "191980669305678893551417027575628410262",
                "158803454357845718603818252518031510261",
                "131039815073858410937181543394939344874",
                "163281338214721212790067069668769232014"
            ]
        },
        "id": "CVE-2024-43818-e8adcf82"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
6.1.103
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.44
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.10.3