CVE-2022-49291

In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Fix races among concurrent hw_params and hw_free calls Currently we have neither proper check nor protection against the concurrent calls of PCM hw_params and hw_free ioctls, which may result in a UAF. Since the existing PCM stream lock can't be used for protecting the whole ioctl operations, we need a new mutex to protect those racy calls. This patch introduced a new mutex, runtime->buffer_mutex, and applies it to both hw_params and hw_free ioctl code paths. Along with it, the both functions are slightly modified (the mmap_count check is moved into the state-check block) for code simplicity.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

25 Mar 2025, 14:49

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: pcm: Arregla ejecuciones entre llamadas hw_params y hw_free concurrentes Actualmente no tenemos ni la comprobación adecuada ni la protección contra las llamadas concurrentes de las ioctl hw_params y hw_free de PCM, lo que puede resultar en un UAF. Dado que el bloqueo de flujo de PCM existente no se puede utilizar para proteger todas las operaciones ioctl, necesitamos un nuevo mutex para proteger esas llamadas con ejecuciones. Este parche introdujo un nuevo mutex, runtime->buffer_mutex, y lo aplica a las rutas de código de ioctl hw_params y hw_free. Junto con él, ambas funciones se modifican ligeramente (la comprobación mmap_count se mueve al bloque state-check) para simplificar el código.
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/0090c13cbbdffd7da079ac56f80373a9a1be0bf8 - () https://git.kernel.org/stable/c/0090c13cbbdffd7da079ac56f80373a9a1be0bf8 - Patch
References () https://git.kernel.org/stable/c/0f6947f5f5208f6ebd4d76a82a4757e2839a23f8 - () https://git.kernel.org/stable/c/0f6947f5f5208f6ebd4d76a82a4757e2839a23f8 - Patch
References () https://git.kernel.org/stable/c/1bbf82d9f961414d6c76a08f7f843ea068e0ab7b - () https://git.kernel.org/stable/c/1bbf82d9f961414d6c76a08f7f843ea068e0ab7b - Patch
References () https://git.kernel.org/stable/c/33061d0fba51d2bf70a2ef9645f703c33fe8e438 - () https://git.kernel.org/stable/c/33061d0fba51d2bf70a2ef9645f703c33fe8e438 - Patch
References () https://git.kernel.org/stable/c/92ee3c60ec9fe64404dc035e7c41277d74aa26cb - () https://git.kernel.org/stable/c/92ee3c60ec9fe64404dc035e7c41277d74aa26cb - Patch
References () https://git.kernel.org/stable/c/9cb6c40a6ebe4a0cfc9d6a181958211682cffea9 - () https://git.kernel.org/stable/c/9cb6c40a6ebe4a0cfc9d6a181958211682cffea9 - Patch
References () https://git.kernel.org/stable/c/a42aa926843acca96c0dfbde2e835b8137f2f092 - () https://git.kernel.org/stable/c/a42aa926843acca96c0dfbde2e835b8137f2f092 - Patch
References () https://git.kernel.org/stable/c/fbeb492694ce0441053de57699e1e2b7bc148a69 - () https://git.kernel.org/stable/c/fbeb492694ce0441053de57699e1e2b7bc148a69 - Patch

27 Feb 2025, 18:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-25 14:49


NVD link : CVE-2022-49291

Mitre link : CVE-2022-49291

CVE.ORG link : CVE-2022-49291


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free