In the Linux kernel, the following vulnerability has been resolved:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
Currently we have neither proper check nor protection against the
concurrent calls of PCM hw_params and hw_free ioctls, which may result
in a UAF. Since the existing PCM stream lock can't be used for
protecting the whole ioctl operations, we need a new mutex to protect
those racy calls.
This patch introduced a new mutex, runtime->buffer_mutex, and applies
it to both hw_params and hw_free ioctl code paths. Along with it, the
both functions are slightly modified (the mmap_count check is moved
into the state-check block) for code simplicity.
References
Configurations
Configuration 1 (hide)
|
History
25 Mar 2025, 14:49
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Summary |
|
|
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/0090c13cbbdffd7da079ac56f80373a9a1be0bf8 - Patch | |
References | () https://git.kernel.org/stable/c/0f6947f5f5208f6ebd4d76a82a4757e2839a23f8 - Patch | |
References | () https://git.kernel.org/stable/c/1bbf82d9f961414d6c76a08f7f843ea068e0ab7b - Patch | |
References | () https://git.kernel.org/stable/c/33061d0fba51d2bf70a2ef9645f703c33fe8e438 - Patch | |
References | () https://git.kernel.org/stable/c/92ee3c60ec9fe64404dc035e7c41277d74aa26cb - Patch | |
References | () https://git.kernel.org/stable/c/9cb6c40a6ebe4a0cfc9d6a181958211682cffea9 - Patch | |
References | () https://git.kernel.org/stable/c/a42aa926843acca96c0dfbde2e835b8137f2f092 - Patch | |
References | () https://git.kernel.org/stable/c/fbeb492694ce0441053de57699e1e2b7bc148a69 - Patch |
27 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-416 |
26 Feb 2025, 07:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 07:01
Updated : 2025-03-25 14:49
NVD link : CVE-2022-49291
Mitre link : CVE-2022-49291
CVE.ORG link : CVE-2022-49291
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free