CVE-2024-53197

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configuration.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

10 Apr 2025, 15:37

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0b4ea4bfe16566b84645ded1403756a2dc4e0f19 - () https://git.kernel.org/stable/c/0b4ea4bfe16566b84645ded1403756a2dc4e0f19 - Patch
References () https://git.kernel.org/stable/c/379d3b9799d9da953391e973b934764f01e03960 - () https://git.kernel.org/stable/c/379d3b9799d9da953391e973b934764f01e03960 - Patch
References () https://git.kernel.org/stable/c/62dc01c83fa71e10446ee4c31e0e3d5d1291e865 - () https://git.kernel.org/stable/c/62dc01c83fa71e10446ee4c31e0e3d5d1291e865 - Patch
References () https://git.kernel.org/stable/c/920a369a9f014f10ec282fd298d0666129379f1b - () https://git.kernel.org/stable/c/920a369a9f014f10ec282fd298d0666129379f1b - Patch
References () https://git.kernel.org/stable/c/9887d859cd60727432a01564e8f91302d361b72b - () https://git.kernel.org/stable/c/9887d859cd60727432a01564e8f91302d361b72b - Patch
References () https://git.kernel.org/stable/c/9b8460a2a7ce478e0b625af7c56d444dc24190f7 - () https://git.kernel.org/stable/c/9b8460a2a7ce478e0b625af7c56d444dc24190f7 - Patch
References () https://git.kernel.org/stable/c/b521b53ac6eb04e41c03f46f7fe452e4d8e9bcca - () https://git.kernel.org/stable/c/b521b53ac6eb04e41c03f46f7fe452e4d8e9bcca - Patch
References () https://git.kernel.org/stable/c/b8f8b81dabe52b413fe9e062e8a852c48dd0680d - () https://git.kernel.org/stable/c/b8f8b81dabe52b413fe9e062e8a852c48dd0680d - Patch
References () https://git.kernel.org/stable/c/b909df18ce2a998afef81d58bbd1a05dc0788c40 - () https://git.kernel.org/stable/c/b909df18ce2a998afef81d58bbd1a05dc0788c40 - Patch

07 Apr 2025, 19:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-787
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: usb-audio: Se corrigen posibles accesos fuera de los límites para dispositivos Extigy y Mbox Un dispositivo falso puede proporcionar un valor bNumConfigurations que exceda el valor inicial utilizado en usb_get_configuration para asignar dev->config. Esto puede provocar accesos fuera de los límites más adelante, por ejemplo, en usb_destroy_configuration.

27 Dec 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-27 14:15

Updated : 2025-04-10 15:37


NVD link : CVE-2024-53197

Mitre link : CVE-2024-53197

CVE.ORG link : CVE-2024-53197


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write