In the Linux kernel, the following vulnerability has been resolved:
ASoC: topology: Fix references to freed memory
Most users after parsing a topology file, release memory used by it, so
having pointer references directly into topology file contents is wrong.
Use devm_kmemdup(), to allocate memory as needed.
git.kernel.org/stable/c/97ab304ecd95c0b1703ff8c8c3956dc6e2afe8e1
git.kernel.org/stable/c/ab5a6208b4d6872b1c6ecea1867940fc668cc76d
git.kernel.org/stable/c/b188d7f3dfab10e332e3c1066e18857964a520d2
git.kernel.org/stable/c/ccae5c6a1fab9494c86b7856faf05e296c617702
security-tracker.debian.org/tracker/CVE-2024-41069