In the Linux kernel, the following vulnerability has been resolved:
ALSA: pcm: Fix race of buffer access at PCM OSS layer
The PCM OSS layer tries to clear the buffer with the silence data at
initialization (or reconfiguration) of a stream with the explicit call
of snd_pcm_format_set_silence() with runtime->dma_area. But this may
lead to a UAF because the accessed runtime->dma_area might be freed
concurrently, as it's performed outside the PCM ops.
For avoiding it, move the code into the PCM core and perform it inside
the buffer access lock, so that it won't be changed during the
operation.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Dec 2025, 17:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/10217da9644ae75cea7330f902c35fc5ba78bbbf - Patch | |
| References | () https://git.kernel.org/stable/c/74d90875f3d43f3eff0e9861c4701418795d3455 - Patch | |
| References | () https://git.kernel.org/stable/c/8170d8ec4efd0be352c14cb61f374e30fb0c2a25 - Patch | |
| References | () https://git.kernel.org/stable/c/93a81ca0657758b607c3f4ba889ae806be9beb73 - Patch | |
| References | () https://git.kernel.org/stable/c/afa56c960fcb4db37f2e3399f28e9402e4e1f470 - Patch | |
| References | () https://git.kernel.org/stable/c/bf85e49aaf3a3c5775ea87369ea5f159c2148db4 - Patch | |
| References | () https://git.kernel.org/stable/c/c0e05a76fc727929524ef24a19c302e6dd40233f - Patch | |
| References | () https://git.kernel.org/stable/c/f3e14d706ec18faf19f5a6e75060e140fea05d4a - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
| CWE | CWE-362 | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.15:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
18 Jun 2025, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-18 10:15
Updated : 2025-12-17 17:57
NVD link : CVE-2025-38078
Mitre link : CVE-2025-38078
CVE.ORG link : CVE-2025-38078
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
