CVE-2024-53150

Severity CVSS v4.0:
Pending analysis
Type:
CWE-125 Out-of-bounds Read
Publication date:
24/12/2024
Last modified:
10/04/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ALSA: usb-audio: Fix out of bounds reads when finding clock sources<br /> <br /> The current USB-audio driver code doesn&amp;#39;t check bLength of each<br /> descriptor at traversing for clock descriptors. That is, when a<br /> device provides a bogus descriptor with a shorter bLength, the driver<br /> might hit out-of-bounds reads.<br /> <br /> For addressing it, this patch adds sanity checks to the validator<br /> functions for the clock descriptor traversal. When the descriptor<br /> length is shorter than expected, it&amp;#39;s skipped in the loop.<br /> <br /> For the clock source and clock multiplier descriptors, we can just<br /> check bLength against the sizeof() of each descriptor type.<br /> OTOH, the clock selector descriptor of UAC2 and UAC3 has an array<br /> of bNrInPins elements and two more fields at its tail, hence those<br /> have to be checked in addition to the sizeof() check.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.4.287 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.231 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.174 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.120 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.64 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.11.11 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.12 (including) 6.12.2 (excluding)