We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-56533

ALSA: usx2y: Use snd_card_free_when_closed() at disconnection



Description

In the Linux kernel, the following vulnerability has been resolved: ALSA: usx2y: Use snd_card_free_when_closed() at disconnection The USB disconnect callback is supposed to be short and not too-long waiting. OTOH, the current code uses snd_card_free() at disconnection, but this waits for the close of all used fds, hence it can take long. It eventually blocks the upper layer USB ioctls, which may trigger a soft lockup. An easy workaround is to replace snd_card_free() with snd_card_free_when_closed(). This variant returns immediately while the release of resources is done asynchronously by the card device release at the last close.

Reserved 2024-12-27 | Published 2024-12-27 | Updated 2025-01-20 | Assigner Linux

Product status

Default status
unaffected

230cd5e24853ed4dd960461989b8ed0986d37a99 before 24fe9f7ca83ec9acf765339054951f5cd9ae5c5d
affected

230cd5e24853ed4dd960461989b8ed0986d37a99 before befcca1777525e37c659b4129d8ac7463b07ef67
affected

230cd5e24853ed4dd960461989b8ed0986d37a99 before 7bd8838c0ea886679a32834fdcacab296d072fbe
affected

230cd5e24853ed4dd960461989b8ed0986d37a99 before e07605d855c4104d981653146a330ea48f6266ed
affected

230cd5e24853ed4dd960461989b8ed0986d37a99 before ffbfc6c4330fc233698529656798bee44fea96f5
affected

230cd5e24853ed4dd960461989b8ed0986d37a99 before e869642a77a9b3b98b0ab2c8fec7af4385140909
affected

230cd5e24853ed4dd960461989b8ed0986d37a99 before dafb28f02be407e07a6f679e922a626592b481b0
affected

Default status
affected

2.6.13
affected

Any version before 2.6.13
unaffected

5.10.231
unaffected

5.15.174
unaffected

6.1.120
unaffected

6.6.64
unaffected

6.11.11
unaffected

6.12.2
unaffected

6.13
unaffected

References

git.kernel.org/...c/24fe9f7ca83ec9acf765339054951f5cd9ae5c5d

git.kernel.org/...c/befcca1777525e37c659b4129d8ac7463b07ef67

git.kernel.org/...c/7bd8838c0ea886679a32834fdcacab296d072fbe

git.kernel.org/...c/e07605d855c4104d981653146a330ea48f6266ed

git.kernel.org/...c/ffbfc6c4330fc233698529656798bee44fea96f5

git.kernel.org/...c/e869642a77a9b3b98b0ab2c8fec7af4385140909

git.kernel.org/...c/dafb28f02be407e07a6f679e922a626592b481b0

cve.org (CVE-2024-56533)

nvd.nist.gov (CVE-2024-56533)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-56533

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.