In the Linux kernel, the following vulnerability has been resolved:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
Currently we have neither proper check nor protection against the
concurrent calls of PCM hw_params and hw_free ioctls, which may result
in a UAF.  Since the existing PCM stream lock can't be used for
protecting the whole ioctl operations, we need a new mutex to protect
those racy calls.
This patch introduced a new mutex, runtime->buffer_mutex, and applies
it to both hw_params and hw_free ioctl code paths.  Along with it, the
both functions are slightly modified (the mmap_count check is moved
into the state-check block) for code simplicity.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    25 Mar 2025, 14:49
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | 
        
        Linux linux Kernel
         Linux  | 
|
| References | () https://git.kernel.org/stable/c/0090c13cbbdffd7da079ac56f80373a9a1be0bf8 - Patch | |
| References | () https://git.kernel.org/stable/c/0f6947f5f5208f6ebd4d76a82a4757e2839a23f8 - Patch | |
| References | () https://git.kernel.org/stable/c/1bbf82d9f961414d6c76a08f7f843ea068e0ab7b - Patch | |
| References | () https://git.kernel.org/stable/c/33061d0fba51d2bf70a2ef9645f703c33fe8e438 - Patch | |
| References | () https://git.kernel.org/stable/c/92ee3c60ec9fe64404dc035e7c41277d74aa26cb - Patch | |
| References | () https://git.kernel.org/stable/c/9cb6c40a6ebe4a0cfc9d6a181958211682cffea9 - Patch | |
| References | () https://git.kernel.org/stable/c/a42aa926843acca96c0dfbde2e835b8137f2f092 - Patch | |
| References | () https://git.kernel.org/stable/c/fbeb492694ce0441053de57699e1e2b7bc148a69 - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| Summary | 
        
        
  | 
27 Feb 2025, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 7.8  | 
| CWE | CWE-416 | 
26 Feb 2025, 07:01
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-02-26 07:01
Updated : 2025-03-25 14:49
NVD link : CVE-2022-49291
Mitre link : CVE-2022-49291
CVE.ORG link : CVE-2022-49291
JSON object : View
Products Affected
                linux
- linux_kernel
 
CWE
                
                    
                        
                        CWE-416
                        
            Use After Free
