Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2024-56531— ALSA: caiaq: Use snd_card_free_when_closed() at disconnection

EPSS 0.01% · P1

Affected Version Matrix 20

VendorProductVersion RangeStatus
LinuxLinux523f1dce37434a9a6623bf46e7893e2b4b10ac3c< 3993edf44d3df7b6e8c753eac6ac8783473fcbabaffected
523f1dce37434a9a6623bf46e7893e2b4b10ac3c< ebad462eec93b0f701dfe4de98990e7355283801affected
523f1dce37434a9a6623bf46e7893e2b4b10ac3c< 4dd821dcbfcecf7af6a08370b0b217cde2818acfaffected
523f1dce37434a9a6623bf46e7893e2b4b10ac3c< cadf1d8e9ddcd74584ec961aeac14ac549b261d8affected
523f1dce37434a9a6623bf46e7893e2b4b10ac3c< 237f3faf0177bdde728fa3106d730d806436aa4daffected
523f1dce37434a9a6623bf46e7893e2b4b10ac3c< 4507a8b9b30344c5ddd8219945f446d47e966a6daffected
523f1dce37434a9a6623bf46e7893e2b4b10ac3c< dd0de8cb708951cebf727aa045e8242ba651bb52affected
523f1dce37434a9a6623bf46e7893e2b4b10ac3c< a3f9314752dbb6f6aa1f0f2b4c58243bda800738affected
… +12 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-56531

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ALSA: caiaq: Use snd_card_free_when_closed() at disconnection
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ALSA: caiaq: Use snd_card_free_when_closed() at disconnection The USB disconnect callback is supposed to be short and not too-long waiting. OTOH, the current code uses snd_card_free() at disconnection, but this waits for the close of all used fds, hence it can take long. It eventually blocks the upper layer USB ioctls, which may trigger a soft lockup. An easy workaround is to replace snd_card_free() with snd_card_free_when_closed(). This variant returns immediately while the release of resources is done asynchronously by the card device release at the last close. This patch also splits the code to the disconnect and the free phases; the former is called immediately at the USB disconnect callback while the latter is called from the card destructor.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于ALSA:caiaq模块中USB断开时未使用snd_card_free_when_closed,可能导致软锁。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 523f1dce37434a9a6623bf46e7893e2b4b10ac3c ~ 3993edf44d3df7b6e8c753eac6ac8783473fcbab -
LinuxLinux 2.6.22 -

II. Public POCs for CVE-2024-56531

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-56531

登录查看更多情报信息。

Patches & Fixes for CVE-2024-56531 (9)

Same Patch Batch · Linux · 2024-12-27 · 221 CVEs total

CVE-2024-56607wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask()
CVE-2024-56594drm/amdgpu: set the right AMDGPU sg segment limitation
CVE-2024-56595jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
CVE-2024-56596jfs: fix array-index-out-of-bounds in jfs_readdir
CVE-2024-56597jfs: fix shift-out-of-bounds in dbSplit
CVE-2024-56598jfs: array-index-out-of-bounds fix in dtReadFirst
CVE-2024-56599wifi: ath10k: avoid NULL pointer error during sdio remove
CVE-2024-56601net: inet: do not leave a dangling sk pointer in inet_create()
CVE-2024-56600net: inet6: do not leave a dangling sk pointer in inet6_create()
CVE-2024-56602net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
CVE-2024-56603net: af_can: do not leave a dangling sk pointer in can_create()
CVE-2024-56604Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()
CVE-2024-56605Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
CVE-2024-56606af_packet: avoid erroring out after sock_init_data() in packet_create()
CVE-2024-56618pmdomain: imx: gpcv2: Adjust delay after power up handshake
CVE-2024-56615bpf: fix OOB devmap writes when deleting elements
CVE-2024-56616drm/dp_mst: Fix MST sideband message body length check
CVE-2024-56617cacheinfo: Allocate memory during CPU hotplug if not done from the primary CPU
CVE-2024-56614xsk: fix OOB map writes when deleting elements
CVE-2024-56619nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()

Showing top 20 of 221 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2024-56531

No comments yet


Leave a comment