Executive Summary



This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary
Informations
Name CVE-2024-57893 First vendor Publication 2025-01-15
Vendor Cve Last vendor Modification 2025-01-15

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

ALSA: seq: oss: Fix races at processing SysEx messages

OSS sequencer handles the SysEx messages split in 6 bytes packets, and ALSA sequencer OSS layer tries to combine those. It stores the data in the internal buffer and this access is racy as of now, which may lead to the out-of-bounds access.

As a temporary band-aid fix, introduce a mutex for serializing the process of the SysEx message packets.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57893

Sources (Detail)

https://git.kernel.org/stable/c/0179488ca992d79908b8e26b9213f1554fc5bacc
https://git.kernel.org/stable/c/9d382112b36382aa65aad765f189ebde9926c101
https://git.kernel.org/stable/c/cff1de87ed14fc0f2332213d2367100e7ad0753a
https://git.kernel.org/stable/c/d2392b79d8af3714ea8878b71c66dc49d3110f44
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2025-01-15 17:20:30
  • First insertion