In the Linux kernel, the following vulnerability has been resolved:
ALSA: seq: oss: Fix races at processing SysEx messages
OSS sequencer handles the SysEx messages split in 6 bytes packets, and
ALSA sequencer OSS layer tries to combine those. It stores the data
in the internal buffer and this access is racy as of now, which may
lead to the out-of-bounds access.
As a temporary band-aid fix, introduce a mutex for serializing the
process of the SysEx message packets.
References
Configurations
Configuration 1 (hide)
|
History
26 Sep 2025, 20:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/0179488ca992d79908b8e26b9213f1554fc5bacc - Patch | |
References | () https://git.kernel.org/stable/c/9d382112b36382aa65aad765f189ebde9926c101 - Patch | |
References | () https://git.kernel.org/stable/c/cff1de87ed14fc0f2332213d2367100e7ad0753a - Patch | |
References | () https://git.kernel.org/stable/c/d2392b79d8af3714ea8878b71c66dc49d3110f44 - Patch | |
Summary |
|
|
CPE | cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* |
|
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
CWE | CWE-362 |
15 Jan 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-15 13:15
Updated : 2025-09-26 20:08
NVD link : CVE-2024-57893
Mitre link : CVE-2024-57893
CVE.ORG link : CVE-2024-57893
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')