CVE-2024-53150

ALSA: usb-audio: Fix out of bounds reads when finding clock sources

Basic Information

CVE State
PUBLISHED
Reserved Date
November 19, 2024
Published Date
December 24, 2024
Last Updated
April 09, 2025
Vendor
Linux
Product
Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out of bounds reads when finding clock sources The current USB-audio driver code doesn't check bLength of each descriptor at traversing for clock descriptors. That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-bounds reads. For addressing it, this patch adds sanity checks to the validator functions for the clock descriptor traversal. When the descriptor length is shorter than expected, it's skipped in the loop. For the clock source and clock multiplier descriptors, we can just check bLength against the sizeof() of each descriptor type. OTOH, the clock selector descriptor of UAC2 and UAC3 has an array of bNrInPins elements and two more fields at its tail, hence those have to be checked in addition to the sizeof() check.

CVSS Scores

EPSS Score

Score
0.38% (Percentile: 58.45%) as of 2025-04-29

SSVC Information

Exploitation
active
Technical Impact
partial

Exploit Status

Exploited in the Wild
Yes (added 2025-04-09 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2025-04-09 00:00:00 UTC