First published: Wed Jan 15 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ALSA: seq: oss: Fix races at processing SysEx messages OSS sequencer handles the SysEx messages split in 6 bytes packets, and ALSA sequencer OSS layer tries to combine those. It stores the data in the internal buffer and this access is racy as of now, which may lead to the out-of-bounds access. As a temporary band-aid fix, introduce a mutex for serializing the process of the SysEx message packets.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
debian/linux | <=5.10.223-1<=5.10.234-1 | 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
debian/linux-6.1 | 6.1.129-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-57893 is considered moderate due to the potential for race conditions in processing SysEx messages.
To fix CVE-2024-57893, update your Linux kernel to the latest version where this vulnerability has been resolved.
CVE-2024-57893 affects multiple versions of the Linux kernel that include the OSS sequencer functionality.
CVE-2024-57893 could lead to unexpected behavior or crashes in the ALSA OSS sequencer when handling SysEx messages.
CVE-2024-57893 is primarily a local vulnerability, affecting users with access to the system that can interact with the ALSA OSS layer.