CISA KEV 정보
| 취약점명 | Linux Kernel Out-of-Bounds Access Vulnerability |
|---|---|
| 설명 | Linux Kernel contains an out-of-bounds access vulnerability in the USB-audio driver that allows an attacker with physical access to the system to use a malicious USB device to potentially manipulate system memory, escalate privileges, or execute arbitrary code. |
| 조치사항 | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-787 |
| 등록일 (KEV) | 2025-04-09 |
| 조치 기한 | 2025-04-30 |
| 추가 참고 | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-53197-6aef@gregkh/ ; https://source.android.com/docs/security/bulletin/2025-04-01 ; https://nvd.nist.gov/vuln/detail/CVE-2024-53197 |
NVD 상세 정보
CVSS v3.1: 7.8 HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H설명: In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configuration.
CWE: CWE-787
참조
- https://git.kernel.org/stable/c/0b4ea4bfe16566b84645ded1403756a2dc4e0f19 [Patch]
- https://git.kernel.org/stable/c/379d3b9799d9da953391e973b934764f01e03960 [Patch]
- https://git.kernel.org/stable/c/62dc01c83fa71e10446ee4c31e0e3d5d1291e865 [Patch]
- https://git.kernel.org/stable/c/920a369a9f014f10ec282fd298d0666129379f1b [Patch]
- https://git.kernel.org/stable/c/9887d859cd60727432a01564e8f91302d361b72b [Patch]
- https://git.kernel.org/stable/c/9b8460a2a7ce478e0b625af7c56d444dc24190f7 [Patch]
- https://git.kernel.org/stable/c/b521b53ac6eb04e41c03f46f7fe452e4d8e9bcca [Patch]
- https://git.kernel.org/stable/c/b8f8b81dabe52b413fe9e062e8a852c48dd0680d [Patch]
- https://git.kernel.org/stable/c/b909df18ce2a998afef81d58bbd1a05dc0788c40 [Patch]
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html [Mailing List]
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html [Mailing List]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-53197 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.