CVE-2025-23134

In the Linux kernel, the following vulnerability has been resolved: ALSA: timer: Don't take register_mutex with copy_from/to_user() The infamous mmap_lock taken in copy_from/to_user() can be often problematic when it's called inside another mutex, as they might lead to deadlocks. In the case of ALSA timer code, the bad pattern is with guard(mutex)(&register_mutex) that covers copy_from/to_user() -- which was mistakenly introduced at converting to guard(), and it had been carefully worked around in the past. This patch fixes those pieces simply by moving copy_from/to_user() out of the register mutex lock again.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

29 Apr 2025, 18:51

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/15291b561d8cc835a2eea76b394070cf8e072771 - () https://git.kernel.org/stable/c/15291b561d8cc835a2eea76b394070cf8e072771 - Patch
References () https://git.kernel.org/stable/c/296f7a9e15aab276db11206cbc1e2ae1215d7862 - () https://git.kernel.org/stable/c/296f7a9e15aab276db11206cbc1e2ae1215d7862 - Patch
References () https://git.kernel.org/stable/c/3424c8f53bc63c87712a7fc22dc13d0cc85fb0d6 - () https://git.kernel.org/stable/c/3424c8f53bc63c87712a7fc22dc13d0cc85fb0d6 - Patch
References () https://git.kernel.org/stable/c/b074f47e55df93832bbbca1b524c501e6fea1c0d - () https://git.kernel.org/stable/c/b074f47e55df93832bbbca1b524c501e6fea1c0d - Patch
CWE CWE-667
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: temporizador: No se utiliza register_mutex con copy_from/to_user(). El infame bloqueo mmap utilizado en copy_from/to_user() puede ser problemático cuando se invoca dentro de otro mutex, ya que podría provocar interbloqueos. En el caso del código del temporizador ALSA, el patrón incorrecto se encuentra en guard(mutex)(&register_mutex) que cubre copy_from/to_user(), que se introdujo por error al convertir a guard() y que ya se había solucionado cuidadosamente en el pasado. Este parche corrige estos problemas simplemente sacando copy_from/to_user() del bloqueo mutex de registro.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

16 Apr 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-16 15:16

Updated : 2025-04-29 18:51


NVD link : CVE-2025-23134

Mitre link : CVE-2025-23134

CVE.ORG link : CVE-2025-23134


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking