VYPR
High severity7.1NVD Advisory· Published Jun 21, 2024· Updated May 12, 2026

CVE-2024-38635

CVE-2024-38635

Description

In the Linux kernel, the following vulnerability has been resolved:

soundwire: cadence: fix invalid PDI offset

For some reason, we add an offset to the PDI, presumably to skip the PDI0 and PDI1 which are reserved for BPT.

This code is however completely wrong and leads to an out-of-bounds access. We were just lucky so far since we used only a couple of PDIs and remained within the PDI array bounds.

A Fixes: tag is not provided since there are no known platforms where the out-of-bounds would be accessed, and the initial code had problems as well.

A follow-up patch completely removes this useless offset.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An out-of-bounds access in the Linux kernel's SoundWire cadence driver due to an invalid PDI offset could lead to memory corruption and system compromise.

What the vulnerability is

CVE-2024-38635 is an out-of-bounds access vulnerability in the SoundWire Cadence driver within the Linux kernel. The driver incorrectly adds an offset to the PDI (Physical Data Interface) index, intended to skip reserved PDIs (PDI0 and PDI1) used for BPT (Bus Privilege Table). This miscalculation can cause the driver to read or write beyond the allocated PDI array, leading to memory corruption.

How it is exploited

The vulnerability is triggered when the SoundWire Cadence driver processes PDI configuration. No special privileges are required beyond the ability to interact with the SoundWire subsystem, which could be achieved by a local user or a malicious peripheral. The out-of-bounds access occurs during normal operation, and an attacker who can control the PDI configuration may influence the memory being accessed.

Impact

Successful exploitation could result in a system crash (denial of service) or, in more severe cases, privilege escalation or arbitrary code execution, as the corruption of kernel memory can be leveraged to gain higher privileges.

Mitigation

The Linux kernel has released fixes for this vulnerability through stable commits (e.g., [2]). Additionally, Siemens has acknowledged the vulnerability as affecting the SIMATIC S7-1500 TM MFP - GNU/Linux subsystem in advisory SSA-265688 [1]. Users should apply the patched kernel versions or follow vendor guidance to mitigate the risk.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

95

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.