We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-56532

ALSA: us122l: Use snd_card_free_when_closed() at disconnection



Description

In the Linux kernel, the following vulnerability has been resolved: ALSA: us122l: Use snd_card_free_when_closed() at disconnection The USB disconnect callback is supposed to be short and not too-long waiting. OTOH, the current code uses snd_card_free() at disconnection, but this waits for the close of all used fds, hence it can take long. It eventually blocks the upper layer USB ioctls, which may trigger a soft lockup. An easy workaround is to replace snd_card_free() with snd_card_free_when_closed(). This variant returns immediately while the release of resources is done asynchronously by the card device release at the last close. The loop of us122l->mmap_count check is dropped as well. The check is useless for the asynchronous operation with *_when_closed().

Reserved 2024-12-27 | Published 2024-12-27 | Updated 2024-12-27 | Assigner Linux

Product status

Default status
unaffected

030a07e441296c372f946cd4065b5d831d8dc40c before 020cbc4d7414f0962004213e2b7bc5cc607e9ec7
affected

030a07e441296c372f946cd4065b5d831d8dc40c before 75f418b249d84021865eaa59515d3ed9b75ce4d6
affected

030a07e441296c372f946cd4065b5d831d8dc40c before bf0aa35a7cb8602cccf2387712114e836f65c154
affected

030a07e441296c372f946cd4065b5d831d8dc40c before 9a48bd2184b142c92a4e17eac074c61fcf975bc9
affected

030a07e441296c372f946cd4065b5d831d8dc40c before bc778ad3e495333eebda36fe91d5b2c93109cc16
affected

030a07e441296c372f946cd4065b5d831d8dc40c before 2938dd2648522336133c151dd67bb9bf01cbd390
affected

030a07e441296c372f946cd4065b5d831d8dc40c before 9b27924dc8d7f8a8c35e521287d4ccb9a006e597
affected

030a07e441296c372f946cd4065b5d831d8dc40c before 9d5c530e4d70f64b1114f2cc29ac690ba7ac4a38
affected

030a07e441296c372f946cd4065b5d831d8dc40c before b7df09bb348016943f56b09dcaafe221e3f73947
affected

Default status
affected

2.6.28
affected

Any version before 2.6.28
unaffected

4.19.325
unaffected

5.4.287
unaffected

5.10.231
unaffected

5.15.174
unaffected

6.1.120
unaffected

6.6.64
unaffected

6.11.11
unaffected

6.12.2
unaffected

6.13-rc1
unaffected

References

git.kernel.org/...c/020cbc4d7414f0962004213e2b7bc5cc607e9ec7

git.kernel.org/...c/75f418b249d84021865eaa59515d3ed9b75ce4d6

git.kernel.org/...c/bf0aa35a7cb8602cccf2387712114e836f65c154

git.kernel.org/...c/9a48bd2184b142c92a4e17eac074c61fcf975bc9

git.kernel.org/...c/bc778ad3e495333eebda36fe91d5b2c93109cc16

git.kernel.org/...c/2938dd2648522336133c151dd67bb9bf01cbd390

git.kernel.org/...c/9b27924dc8d7f8a8c35e521287d4ccb9a006e597

git.kernel.org/...c/9d5c530e4d70f64b1114f2cc29ac690ba7ac4a38

git.kernel.org/...c/b7df09bb348016943f56b09dcaafe221e3f73947

cve.org (CVE-2024-56532)

nvd.nist.gov (CVE-2024-56532)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-56532

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.