CVE-2024-42097

In the Linux kernel, the following vulnerability has been resolved: ALSA: emux: improve patch ioctl data validation In load_data(), make the validation of and skipping over the main info block match that in load_guspatch(). In load_guspatch(), add checking that the specified patch length matches the actually supplied data, like load_data() already did.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

07 Oct 2025, 16:38

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/40d7def67841343c10f8642a41031fecbb248bab - () https://git.kernel.org/stable/c/40d7def67841343c10f8642a41031fecbb248bab - Patch
References () https://git.kernel.org/stable/c/79d9a000f0220cdaba1682d2a23c0d0c61d620a3 - () https://git.kernel.org/stable/c/79d9a000f0220cdaba1682d2a23c0d0c61d620a3 - Patch
References () https://git.kernel.org/stable/c/7a18293fd8d8519c2f7a03753bc1583b18e3db69 - () https://git.kernel.org/stable/c/7a18293fd8d8519c2f7a03753bc1583b18e3db69 - Patch
References () https://git.kernel.org/stable/c/87039b83fb7bfd7d0e0499aaa8e6c049906b4d14 - () https://git.kernel.org/stable/c/87039b83fb7bfd7d0e0499aaa8e6c049906b4d14 - Patch
References () https://git.kernel.org/stable/c/89b32ccb12ae67e630c6453d778ec30a592a212f - () https://git.kernel.org/stable/c/89b32ccb12ae67e630c6453d778ec30a592a212f - Patch
References () https://git.kernel.org/stable/c/d0ff2443fcbb472206d45a5d2a90cc694065804e - () https://git.kernel.org/stable/c/d0ff2443fcbb472206d45a5d2a90cc694065804e - Patch
References () https://git.kernel.org/stable/c/d23982ea9aa438f35a8c8a6305943e98a8db90f6 - () https://git.kernel.org/stable/c/d23982ea9aa438f35a8c8a6305943e98a8db90f6 - Patch
References () https://git.kernel.org/stable/c/d8f5ce3cb9adf0c72e2ad6089aba02d7a32469c2 - () https://git.kernel.org/stable/c/d8f5ce3cb9adf0c72e2ad6089aba02d7a32469c2 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo

21 Nov 2024, 09:33

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/40d7def67841343c10f8642a41031fecbb248bab - () https://git.kernel.org/stable/c/40d7def67841343c10f8642a41031fecbb248bab -
References () https://git.kernel.org/stable/c/79d9a000f0220cdaba1682d2a23c0d0c61d620a3 - () https://git.kernel.org/stable/c/79d9a000f0220cdaba1682d2a23c0d0c61d620a3 -
References () https://git.kernel.org/stable/c/7a18293fd8d8519c2f7a03753bc1583b18e3db69 - () https://git.kernel.org/stable/c/7a18293fd8d8519c2f7a03753bc1583b18e3db69 -
References () https://git.kernel.org/stable/c/87039b83fb7bfd7d0e0499aaa8e6c049906b4d14 - () https://git.kernel.org/stable/c/87039b83fb7bfd7d0e0499aaa8e6c049906b4d14 -
References () https://git.kernel.org/stable/c/89b32ccb12ae67e630c6453d778ec30a592a212f - () https://git.kernel.org/stable/c/89b32ccb12ae67e630c6453d778ec30a592a212f -
References () https://git.kernel.org/stable/c/d0ff2443fcbb472206d45a5d2a90cc694065804e - () https://git.kernel.org/stable/c/d0ff2443fcbb472206d45a5d2a90cc694065804e -
References () https://git.kernel.org/stable/c/d23982ea9aa438f35a8c8a6305943e98a8db90f6 - () https://git.kernel.org/stable/c/d23982ea9aa438f35a8c8a6305943e98a8db90f6 -
References () https://git.kernel.org/stable/c/d8f5ce3cb9adf0c72e2ad6089aba02d7a32469c2 - () https://git.kernel.org/stable/c/d8f5ce3cb9adf0c72e2ad6089aba02d7a32469c2 -

30 Jul 2024, 13:33

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: emux: mejorar la validación de datos del parche ioctl En load_data(), hacer que la validación y la omisión del bloque de información principal coincidan con la de load_guspatch(). En load_guspatch(), agregue la verificación de que la longitud del parche especificado coincida con los datos realmente proporcionados, como ya lo hizo load_data().

29 Jul 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 18:15

Updated : 2025-10-07 16:38


NVD link : CVE-2024-42097

Mitre link : CVE-2024-42097

CVE.ORG link : CVE-2024-42097


JSON object : View

Products Affected

linux

  • linux_kernel