U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-42097 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: ALSA: emux: improve patch ioctl data validation In load_data(), make the validation of and skipping over the main info block match that in load_guspatch(). In load_guspatch(), add checking that the specified patch length matches the actually supplied data, like load_data() already did.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/40d7def67841343c10f8642a41031fecbb248bab
https://git.kernel.org/stable/c/40d7def67841343c10f8642a41031fecbb248bab
https://git.kernel.org/stable/c/79d9a000f0220cdaba1682d2a23c0d0c61d620a3
https://git.kernel.org/stable/c/79d9a000f0220cdaba1682d2a23c0d0c61d620a3
https://git.kernel.org/stable/c/7a18293fd8d8519c2f7a03753bc1583b18e3db69
https://git.kernel.org/stable/c/7a18293fd8d8519c2f7a03753bc1583b18e3db69
https://git.kernel.org/stable/c/87039b83fb7bfd7d0e0499aaa8e6c049906b4d14
https://git.kernel.org/stable/c/87039b83fb7bfd7d0e0499aaa8e6c049906b4d14
https://git.kernel.org/stable/c/89b32ccb12ae67e630c6453d778ec30a592a212f
https://git.kernel.org/stable/c/89b32ccb12ae67e630c6453d778ec30a592a212f
https://git.kernel.org/stable/c/d0ff2443fcbb472206d45a5d2a90cc694065804e
https://git.kernel.org/stable/c/d0ff2443fcbb472206d45a5d2a90cc694065804e
https://git.kernel.org/stable/c/d23982ea9aa438f35a8c8a6305943e98a8db90f6
https://git.kernel.org/stable/c/d23982ea9aa438f35a8c8a6305943e98a8db90f6
https://git.kernel.org/stable/c/d8f5ce3cb9adf0c72e2ad6089aba02d7a32469c2
https://git.kernel.org/stable/c/d8f5ce3cb9adf0c72e2ad6089aba02d7a32469c2

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-42097
NVD Published Date:
07/29/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org