CVE-2022-49291
26.02.2025, 07:01
In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Fix races among concurrent hw_params and hw_free calls Currently we have neither proper check nor protection against the concurrent calls of PCM hw_params and hw_free ioctls, which may result in a UAF. Since the existing PCM stream lock can't be used for protecting the whole ioctl operations, we need a new mutex to protect those racy calls. This patch introduced a new mutex, runtime->buffer_mutex, and applies it to both hw_params and hw_free ioctl code paths. Along with it, the both functions are slightly modified (the mmap_count check is moved into the state-check block) for code simplicity.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 𝑥 < 4.14.279 |
linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.243 |
linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.193 |
linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.109 |
linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.32 |
linux | linux_kernel | 5.16 ≤ 𝑥 < 5.16.18 |
linux | linux_kernel | 5.17 ≤ 𝑥 < 5.17.1 |
𝑥
= Vulnerable software versions

Debian Releases
Common Weakness Enumeration
References