CVE-2024-53197

Source
https://cve.org/CVERecord?id=CVE-2024-53197
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53197.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53197
Aliases
Downstream
Related
Published
2024-12-27T13:49:39.260Z
Modified
2026-03-11T07:46:11.701237Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
Details

In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices

A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usbgetconfiguration for allocating dev->config.

This can lead to out-of-bounds accesses later, e.g. in usbdestroyconfiguration.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53197.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
0b4ea4bfe16566b84645ded1403756a2dc4e0f19
Fixed
9b8460a2a7ce478e0b625af7c56d444dc24190f7
Fixed
62dc01c83fa71e10446ee4c31e0e3d5d1291e865
Fixed
9887d859cd60727432a01564e8f91302d361b72b
Fixed
920a369a9f014f10ec282fd298d0666129379f1b
Fixed
b8f8b81dabe52b413fe9e062e8a852c48dd0680d
Fixed
379d3b9799d9da953391e973b934764f01e03960
Fixed
b521b53ac6eb04e41c03f46f7fe452e4d8e9bcca
Fixed
b909df18ce2a998afef81d58bbd1a05dc0788c40

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53197.json"