CVE-2024-57893
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
15/01/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ALSA: seq: oss: Fix races at processing SysEx messages<br />
<br />
OSS sequencer handles the SysEx messages split in 6 bytes packets, and<br />
ALSA sequencer OSS layer tries to combine those. It stores the data<br />
in the internal buffer and this access is racy as of now, which may<br />
lead to the out-of-bounds access.<br />
<br />
As a temporary band-aid fix, introduce a mutex for serializing the<br />
process of the SysEx message packets.
Impact
Base Score 3.x
6.30
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.124 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.70 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0179488ca992d79908b8e26b9213f1554fc5bacc
- https://git.kernel.org/stable/c/9d382112b36382aa65aad765f189ebde9926c101
- https://git.kernel.org/stable/c/cff1de87ed14fc0f2332213d2367100e7ad0753a
- https://git.kernel.org/stable/c/d2392b79d8af3714ea8878b71c66dc49d3110f44
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html



