First published: Tue Dec 24 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out of bounds reads when finding clock sources The current USB-audio driver code doesn't check bLength of each descriptor at traversing for clock descriptors. That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-bounds reads. For addressing it, this patch adds sanity checks to the validator functions for the clock descriptor traversal. When the descriptor length is shorter than expected, it's skipped in the loop. For the clock source and clock multiplier descriptors, we can just check bLength against the sizeof() of each descriptor type. OTOH, the clock selector descriptor of UAC2 and UAC3 has an array of bNrInPins elements and two more fields at its tail, hence those have to be checked in addition to the sizeof() check.
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2333971 is classified as high due to potential exploitation risks associated with out of bounds reads.
To fix REDHAT-BUG-2333971, ensure that your system is updated with the latest Linux kernel patches that address this vulnerability.
REDHAT-BUG-2333971 affects the Linux kernel, specifically systems utilizing the USB-audio driver.
REDHAT-BUG-2333971 can lead to potential Denial of Service (DoS) attacks or memory corruption if exploited.
As of now, no specific exploits for REDHAT-BUG-2333971 have been publicly disclosed, but the vulnerability poses significant security risks.