Skip to main content

CVE-2024-50105: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-50105cvecve-2024-50105
Published: Tue Nov 05 2024 (11/05/2024, 17:10:40 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: sc7280: Fix missing Soundwire runtime stream alloc Commit 15c7fab0e047 ("ASoC: qcom: Move Soundwire runtime stream alloc to soundcards") moved the allocation of Soundwire stream runtime from the Qualcomm Soundwire driver to each individual machine sound card driver, except that it forgot to update SC7280 card. Just like for other Qualcomm sound cards using Soundwire, the card driver should allocate and release the runtime. Otherwise sound playback will result in a NULL pointer dereference or other effect of uninitialized memory accesses (which was confirmed on SDM845 having similar issue).

AI-Powered Analysis

AILast updated: 06/28/2025, 17:24:30 UTC

Technical Analysis

CVE-2024-50105 is a vulnerability identified in the Linux kernel specifically affecting the Qualcomm SC7280 sound card driver within the ALSA System on Chip (ASoC) subsystem. The issue stems from a recent code refactor (commit 15c7fab0e047) that moved the allocation of Soundwire runtime streams from the Qualcomm Soundwire driver to individual machine sound card drivers. However, this change inadvertently omitted the SC7280 card driver, which continued to rely on the old allocation method. As a result, the SC7280 driver fails to properly allocate and release the Soundwire runtime stream, leading to uninitialized memory accesses or NULL pointer dereferences during sound playback. This bug was confirmed on the Snapdragon SDM845 platform, which shares similar driver architecture. The vulnerability could cause sound playback failures and potentially lead to kernel crashes or undefined behavior due to dereferencing NULL pointers or accessing uninitialized memory. Although no known exploits are reported in the wild, the flaw represents a stability and reliability risk for affected Linux systems using the Qualcomm SC7280 sound card driver. The vulnerability is rooted in a programming error in kernel driver memory management rather than a direct security bypass or privilege escalation vector.

Potential Impact

For European organizations, the primary impact of CVE-2024-50105 is on system stability and availability where affected Linux kernels run on devices incorporating the Qualcomm SC7280 sound card or similar hardware. This includes embedded systems, mobile devices, or specialized industrial equipment using Linux with Qualcomm Soundwire drivers. The vulnerability could cause kernel crashes or sound subsystem failures, potentially disrupting critical audio-dependent applications such as communication systems, multimedia processing, or industrial control interfaces. While it does not directly expose confidential data or allow privilege escalation, the denial of service caused by kernel instability could affect operational continuity. Organizations relying on Linux-based platforms with Qualcomm SC7280 hardware should be aware of potential service interruptions and plan for timely patching. The lack of known exploits reduces immediate risk but does not eliminate the possibility of future attacks leveraging this flaw for denial-of-service conditions.

Mitigation Recommendations

To mitigate CVE-2024-50105, European organizations should: 1) Identify Linux systems running kernels with Qualcomm SC7280 sound card drivers, particularly those using the affected commit versions. 2) Apply the official Linux kernel patches that correct the Soundwire runtime stream allocation for the SC7280 card driver as soon as they become available from trusted Linux kernel sources or vendor distributions. 3) For embedded or customized Linux builds, ensure that the sound card driver code is updated to allocate and release Soundwire runtime streams properly, mirroring the approach used for other Qualcomm sound cards. 4) Conduct thorough regression testing of audio functionality post-patching to confirm resolution and avoid introducing new issues. 5) Monitor kernel logs for NULL pointer dereferences or sound subsystem errors as indicators of the vulnerability manifesting. 6) Maintain up-to-date inventories of hardware and kernel versions to rapidly assess exposure to similar future vulnerabilities. These steps go beyond generic advice by focusing on driver-level code correctness, targeted patch application, and proactive monitoring specific to the Qualcomm SC7280 sound card environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.946Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbdff52

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 5:24:30 PM

Last updated: 8/7/2025, 6:40:42 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats