CVE-2024-53197
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configuration.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Dec 27, 2024 |
| Last Updated | Nov 3, 2025 |
โ ๏ธ Actively Exploited โ Act Now
Get instant alerts for linux linux
This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2024-53197.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 0b4ea4bfe16566b84645ded1403756a2dc4e0f19 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 9b8460a2a7ce478e0b625af7c56d444dc24190f7 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 62dc01c83fa71e10446ee4c31e0e3d5d1291e865 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 9887d859cd60727432a01564e8f91302d361b72b 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 920a369a9f014f10ec282fd298d0666129379f1b 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < b8f8b81dabe52b413fe9e062e8a852c48dd0680d 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 379d3b9799d9da953391e973b934764f01e03960 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < b521b53ac6eb04e41c03f46f7fe452e4d8e9bcca 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < b909df18ce2a998afef81d58bbd1a05dc0788c40
Linux / Linux
2.6.12
References
git.kernel.org: https://git.kernel.org/stable/c/0b4ea4bfe16566b84645ded1403756a2dc4e0f19 git.kernel.org: https://git.kernel.org/stable/c/9b8460a2a7ce478e0b625af7c56d444dc24190f7 git.kernel.org: https://git.kernel.org/stable/c/62dc01c83fa71e10446ee4c31e0e3d5d1291e865 git.kernel.org: https://git.kernel.org/stable/c/9887d859cd60727432a01564e8f91302d361b72b git.kernel.org: https://git.kernel.org/stable/c/920a369a9f014f10ec282fd298d0666129379f1b git.kernel.org: https://git.kernel.org/stable/c/b8f8b81dabe52b413fe9e062e8a852c48dd0680d git.kernel.org: https://git.kernel.org/stable/c/379d3b9799d9da953391e973b934764f01e03960 git.kernel.org: https://git.kernel.org/stable/c/b521b53ac6eb04e41c03f46f7fe452e4d8e9bcca git.kernel.org: https://git.kernel.org/stable/c/b909df18ce2a998afef81d58bbd1a05dc0788c40 cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-53197 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html