First published: Fri Dec 27 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ALSA: caiaq: Use snd_card_free_when_closed() at disconnection The USB disconnect callback is supposed to be short and not too-long waiting. OTOH, the current code uses snd_card_free() at disconnection, but this waits for the close of all used fds, hence it can take long. It eventually blocks the upper layer USB ioctls, which may trigger a soft lockup. An easy workaround is to replace snd_card_free() with snd_card_free_when_closed(). This variant returns immediately while the release of resources is done asynchronously by the card device release at the last close. This patch also splits the code to the disconnect and the free phases; the former is called immediately at the USB disconnect callback while the latter is called from the card destructor.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | ||
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-56531 is classified as a moderate severity vulnerability in the Linux kernel.
To fix CVE-2024-56531, update to one of the following Linux kernel versions: 6.1.123-1, 6.1.128-1, 6.12.12-1, or 6.12.15-1.
CVE-2024-56531 affects Linux kernel versions up to and including 5.10.226-1.
CVE-2024-56531 affects the ALSA driver component in the Linux kernel, particularly related to USB disconnect handling.
There is no official workaround for CVE-2024-56531; the recommended approach is to apply the available updates.