CVE-2024-27436

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Stop parsing channels bits when all channels are found. If a usb audio device sets more bits than the amount of channels it could write outside of the map array.
References
Link Resource
https://git.kernel.org/stable/c/22cad1b841a63635a38273b799b4791f202ade72 Patch
https://git.kernel.org/stable/c/5cd466673b34bac369334f66cbe14bb77b7d7827 Patch
https://git.kernel.org/stable/c/629af0d5fe94a35f498ba2c3f19bd78bfa591be6 Patch
https://git.kernel.org/stable/c/6d5dc96b154be371df0d62ecb07efe400701ed8a Patch
https://git.kernel.org/stable/c/6d88b289fb0a8d055cb79d1c46a56aba7809d96d Patch
https://git.kernel.org/stable/c/7e2c1b0f6dd9abde9e60f0f9730026714468770f Patch
https://git.kernel.org/stable/c/9af1658ba293458ca6a13f70637b9654fa4be064 Patch
https://git.kernel.org/stable/c/a39d51ff1f52cd0b6fe7d379ac93bd8b4237d1b7 Patch
https://git.kernel.org/stable/c/c8a24fd281dcdf3c926413dafbafcf35cde517a9 Patch
https://git.kernel.org/stable/c/22cad1b841a63635a38273b799b4791f202ade72 Patch
https://git.kernel.org/stable/c/5cd466673b34bac369334f66cbe14bb77b7d7827 Patch
https://git.kernel.org/stable/c/629af0d5fe94a35f498ba2c3f19bd78bfa591be6 Patch
https://git.kernel.org/stable/c/6d5dc96b154be371df0d62ecb07efe400701ed8a Patch
https://git.kernel.org/stable/c/6d88b289fb0a8d055cb79d1c46a56aba7809d96d Patch
https://git.kernel.org/stable/c/7e2c1b0f6dd9abde9e60f0f9730026714468770f Patch
https://git.kernel.org/stable/c/9af1658ba293458ca6a13f70637b9654fa4be064 Patch
https://git.kernel.org/stable/c/a39d51ff1f52cd0b6fe7d379ac93bd8b4237d1b7 Patch
https://git.kernel.org/stable/c/c8a24fd281dcdf3c926413dafbafcf35cde517a9 Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-05-17 13:15

Updated : 2025-12-23 18:45


NVD link : CVE-2024-27436

Mitre link : CVE-2024-27436

CVE.ORG link : CVE-2024-27436


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
NVD-CWE-noinfo CWE-787

Out-of-bounds Write