Linux Kernel up to 6.12.1 usb-audio usb_get_configuration out-of-bounds

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 3.4 | $0-$5k | 0.09 |
Summary
A vulnerability described as problematic has been identified in Linux Kernel up to 6.12.1. Impacted is the function usb_get_configuration of the component usb-audio. Such manipulation leads to out-of-bounds.
This vulnerability is listed as CVE-2024-53197. There is no available exploit.
Upgrading the affected component is recommended.
Details
A vulnerability was found in Linux Kernel up to 6.12.1. It has been rated as problematic. Affected by this issue is the function usb_get_configuration of the component usb-audio. The manipulation with an unknown input leads to a out-of-bounds vulnerability. Using CWE to declare the problem leads to CWE-125. The product reads data past the end, or before the beginning, of the intended buffer. Impacted is confidentiality. CVE summarizes:
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configuration.
The advisory is shared for download at git.kernel.org. This vulnerability is handled as CVE-2024-53197 since 11/19/2024. There are known technical details, but no exploit is available.
It is declared as attacked. The vulnerability scanner Nessus provides a plugin with the ID 216224 (Oracle Linux 7 / 8 : Unbreakable Enterprise kernel (ELSA-2025-20100)), which helps to determine the existence of the flaw in a target environment. This issue was added on 04/09/2025 to the CISA Known Exploited Vulnerabilities Catalog with a due date of 04/30/2025:
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.Upgrading to version 4.19.325, 5.4.287, 5.10.231, 5.15.174, 6.1.120, 6.6.64, 6.11.11 or 6.12.2 eliminates this vulnerability. Applying the patch 0b4ea4bfe16566b84645ded1403756a2dc4e0f19/9b8460a2a7ce478e0b625af7c56d444dc24190f7/62dc01c83fa71e10446ee4c31e0e3d5d1291e865/9887d859cd60727432a01564e8f91302d361b72b/920a369a9f014f10ec282fd298d0666129379f1b/b8f8b81dabe52b413fe9e062e8a852c48dd0680d/379d3b9799d9da953391e973b934764f01e03960/b521b53ac6eb04e41c03f46f7fe452e4d8e9bcca/b909df18ce2a998afef81d58bbd1a05dc0788c40 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
The vulnerability is also documented in the databases at Zero-Day.cz (970), Tenable (216224) and CERT Bund (WID-SEC-2024-3762). VulDB is the best source for vulnerability data and more expert information about this specific topic.
Affected
- Debian Linux
- Amazon Linux 2
- Red Hat Enterprise Linux
- Ubuntu Linux
- SUSE Linux
- Oracle Linux
- RESF Rocky Linux
- Dell NetWorker
- Dell Avamar
- Red Hat OpenShift
- IBM QRadar SIEM
- Dell PowerProtect Data Domain
- Open Source Linux Kernel
- IBM DataPower Gateway
- Dell Secure Connect Gateway
Product
Type
Vendor
Name
Version
- 4.19.324
- 5.4.286
- 5.10.230
- 5.15.173
- 6.1.119
- 6.6.0
- 6.6.1
- 6.6.2
- 6.6.3
- 6.6.4
- 6.6.5
- 6.6.6
- 6.6.7
- 6.6.8
- 6.6.9
- 6.6.10
- 6.6.11
- 6.6.12
- 6.6.13
- 6.6.14
- 6.6.15
- 6.6.16
- 6.6.17
- 6.6.18
- 6.6.19
- 6.6.20
- 6.6.21
- 6.6.22
- 6.6.23
- 6.6.24
- 6.6.25
- 6.6.26
- 6.6.27
- 6.6.28
- 6.6.29
- 6.6.30
- 6.6.31
- 6.6.32
- 6.6.33
- 6.6.34
- 6.6.35
- 6.6.36
- 6.6.37
- 6.6.38
- 6.6.39
- 6.6.40
- 6.6.41
- 6.6.42
- 6.6.43
- 6.6.44
- 6.6.45
- 6.6.46
- 6.6.47
- 6.6.48
- 6.6.49
- 6.6.50
- 6.6.51
- 6.6.52
- 6.6.53
- 6.6.54
- 6.6.55
- 6.6.56
- 6.6.57
- 6.6.58
- 6.6.59
- 6.6.60
- 6.6.61
- 6.6.62
- 6.6.63
- 6.11.0
- 6.11.1
- 6.11.2
- 6.11.3
- 6.11.4
- 6.11.5
- 6.11.6
- 6.11.7
- 6.11.8
- 6.11.9
- 6.11.10
- 6.12.0
- 6.12.1
License
Website
- Vendor: https://www.kernel.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 3.5VulDB Meta Temp Score: 3.4
VulDB Base Score: 3.5
VulDB Temp Score: 3.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Out-of-boundsCWE: CWE-125 / CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Partially
Availability: 🔍
Status: Attacked
EPSS Score: 🔍
EPSS Percentile: 🔍
KEV Added: 🔍
KEV Due: 🔍
KEV Remediation: 🔍
KEV Ransomware: 🔍
KEV Notice: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 216224
Nessus Name: Oracle Linux 7 / 8 : Unbreakable Enterprise kernel (ELSA-2025-20100)
Zero-Day.cz: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Kernel 4.19.325/5.4.287/5.10.231/5.15.174/6.1.120/6.6.64/6.11.11/6.12.2
Patch: 0b4ea4bfe16566b84645ded1403756a2dc4e0f19/9b8460a2a7ce478e0b625af7c56d444dc24190f7/62dc01c83fa71e10446ee4c31e0e3d5d1291e865/9887d859cd60727432a01564e8f91302d361b72b/920a369a9f014f10ec282fd298d0666129379f1b/b8f8b81dabe52b413fe9e062e8a852c48dd0680d/379d3b9799d9da953391e973b934764f01e03960/b521b53ac6eb04e41c03f46f7fe452e4d8e9bcca/b909df18ce2a998afef81d58bbd1a05dc0788c40
Timeline
11/19/2024 🔍12/27/2024 🔍
12/27/2024 🔍
12/15/2025 🔍
Sources
Vendor: kernel.orgAdvisory: git.kernel.org
Status: Confirmed
CVE: CVE-2024-53197 (🔍)
GCVE (CVE): GCVE-0-2024-53197
GCVE (VulDB): GCVE-100-289448
CERT Bund: WID-SEC-2024-3762 - Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
scip Labs: https://www.scip.ch/en/?labs.20161013
Entry
Created: 12/27/2024 15:23Updated: 12/15/2025 01:53
Changes: 12/27/2024 15:23 (59), 02/13/2025 13:36 (2), 03/07/2025 08:41 (6), 04/08/2025 04:15 (1), 04/09/2025 23:00 (9), 07/24/2025 00:26 (7), 10/13/2025 23:34 (1), 12/15/2025 01:53 (1)
Complete: 🔍
Cache ID: 216:E11:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.