In the Linux kernel, the following vulnerability has been resolved:
ALSA: timer: Don't take register_mutex with copy_from/to_user()
The infamous mmap_lock taken in copy_from/to_user() can be often
problematic when it's called inside another mutex, as they might lead
to deadlocks.
In the case of ALSA timer code, the bad pattern is with
guard(mutex)(®ister_mutex) that covers copy_from/to_user() -- which
was mistakenly introduced at converting to guard(), and it had been
carefully worked around in the past.
This patch fixes those pieces simply by moving copy_from/to_user() out
of the register mutex lock again.
References
Configurations
Configuration 1 (hide)
|
History
29 Apr 2025, 18:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/15291b561d8cc835a2eea76b394070cf8e072771 - Patch | |
References | () https://git.kernel.org/stable/c/296f7a9e15aab276db11206cbc1e2ae1215d7862 - Patch | |
References | () https://git.kernel.org/stable/c/3424c8f53bc63c87712a7fc22dc13d0cc85fb0d6 - Patch | |
References | () https://git.kernel.org/stable/c/b074f47e55df93832bbbca1b524c501e6fea1c0d - Patch | |
CWE | CWE-667 | |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
16 Apr 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-16 15:16
Updated : 2025-04-29 18:51
NVD link : CVE-2025-23134
Mitre link : CVE-2025-23134
CVE.ORG link : CVE-2025-23134
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-667
Improper Locking