### [CVE-2024-56657](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56657) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=a135dfb5de1501327895729b4f513370d2555b4d%3C%20d5a1ca7b59804d6779644001a878ed925a4688ca%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description In the Linux kernel, the following vulnerability has been resolved:ALSA: control: Avoid WARN() for symlink errorsUsing WARN() for showing the error of symlink creations don't givemore information than telling that something goes wrong, since theusual code path is a lregister callback from each control elementcreation. More badly, the use of WARN() rather confuses fuzzer as ifit were serious issues.This patch downgrades the warning messages to use the normal dev_err()instead of WARN(). For making it clearer, add the function name tothe prefix, too. ### POC #### Reference No PoCs from references. #### Github - https://github.com/cku-heise/euvd-api-doc - https://github.com/oogasawa/Utility-security