CVE-2025-38078

In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Fix race of buffer access at PCM OSS layer The PCM OSS layer tries to clear the buffer with the silence data at initialization (or reconfiguration) of a stream with the explicit call of snd_pcm_format_set_silence() with runtime->dma_area. But this may lead to a UAF because the accessed runtime->dma_area might be freed concurrently, as it's performed outside the PCM ops. For avoiding it, move the code into the PCM core and perform it inside the buffer access lock, so that it won't be changed during the operation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc7:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

17 Dec 2025, 17:57

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/10217da9644ae75cea7330f902c35fc5ba78bbbf - () https://git.kernel.org/stable/c/10217da9644ae75cea7330f902c35fc5ba78bbbf - Patch
References () https://git.kernel.org/stable/c/74d90875f3d43f3eff0e9861c4701418795d3455 - () https://git.kernel.org/stable/c/74d90875f3d43f3eff0e9861c4701418795d3455 - Patch
References () https://git.kernel.org/stable/c/8170d8ec4efd0be352c14cb61f374e30fb0c2a25 - () https://git.kernel.org/stable/c/8170d8ec4efd0be352c14cb61f374e30fb0c2a25 - Patch
References () https://git.kernel.org/stable/c/93a81ca0657758b607c3f4ba889ae806be9beb73 - () https://git.kernel.org/stable/c/93a81ca0657758b607c3f4ba889ae806be9beb73 - Patch
References () https://git.kernel.org/stable/c/afa56c960fcb4db37f2e3399f28e9402e4e1f470 - () https://git.kernel.org/stable/c/afa56c960fcb4db37f2e3399f28e9402e4e1f470 - Patch
References () https://git.kernel.org/stable/c/bf85e49aaf3a3c5775ea87369ea5f159c2148db4 - () https://git.kernel.org/stable/c/bf85e49aaf3a3c5775ea87369ea5f159c2148db4 - Patch
References () https://git.kernel.org/stable/c/c0e05a76fc727929524ef24a19c302e6dd40233f - () https://git.kernel.org/stable/c/c0e05a76fc727929524ef24a19c302e6dd40233f - Patch
References () https://git.kernel.org/stable/c/f3e14d706ec18faf19f5a6e75060e140fea05d4a - () https://git.kernel.org/stable/c/f3e14d706ec18faf19f5a6e75060e140fea05d4a - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7
CWE CWE-362
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: pcm: Corrección de la ejecución de acceso al búfer en la capa PCM OSS. La capa PCM OSS intenta borrar el búfer con los datos de silencio durante la inicialización (o reconfiguración) de un flujo mediante la llamada explícita a snd_pcm_format_set_silence() con runtime->dma_area. Sin embargo, esto puede generar una UAF, ya que el acceso a runtime->dma_area podría liberarse simultáneamente, ya que se realiza fuera de las operaciones PCM. Para evitarlo, mueva el código al núcleo PCM y ejecútelo dentro del bloqueo de acceso al búfer, de modo que no se modifique durante la operación.

18 Jun 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 10:15

Updated : 2025-12-17 17:57


NVD link : CVE-2025-38078

Mitre link : CVE-2025-38078

CVE.ORG link : CVE-2025-38078


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')