{"uuid": "0a580e86-57a2-45ce-9148-48512a4e56bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57893", "type": "seen", "source": "https://t.me/cvedetector/15460", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57893 - ALSA OSS Linux Kernel Data Out-of-Bounds Access Vuln\", \n  \"Content\": \"CVE ID : CVE-2024-57893 \nPublished : Jan. 15, 2025, 1:15 p.m. | 36\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nALSA: seq: oss: Fix races at processing SysEx messages  \n  \nOSS sequencer handles the SysEx messages split in 6 bytes packets, and  \nALSA sequencer OSS layer tries to combine those.  It stores the data  \nin the internal buffer and this access is racy as of now, which may  \nlead to the out-of-bounds access.  \n  \nAs a temporary band-aid fix, introduce a mutex for serializing the  \nprocess of the SysEx message packets. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T15:07:40.000000Z"}