SB2024062452 - Buffer overflow in Linux kernel soc codecs
Published: June 24, 2024 Updated: May 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2021-47502)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the slim_rx_mux_get(), slim_rx_mux_put() and slim_tx_mixer_put() functions in sound/soc/codecs/wcd934x.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/1089dac26c6b4b833323ae6c0ceab29fb30ede72
- https://git.kernel.org/stable/c/339ffb5b56005582aacc860524d2d208604049d1
- https://git.kernel.org/stable/c/23ba28616d3063bd4c4953598ed5e439ca891101
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.85
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.8
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16