CVE-2022-49291

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
26/02/2025
Last modified:
25/03/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ALSA: pcm: Fix races among concurrent hw_params and hw_free calls<br /> <br /> Currently we have neither proper check nor protection against the<br /> concurrent calls of PCM hw_params and hw_free ioctls, which may result<br /> in a UAF. Since the existing PCM stream lock can&amp;#39;t be used for<br /> protecting the whole ioctl operations, we need a new mutex to protect<br /> those racy calls.<br /> <br /> This patch introduced a new mutex, runtime-&gt;buffer_mutex, and applies<br /> it to both hw_params and hw_free ioctl code paths. Along with it, the<br /> both functions are slightly modified (the mmap_count check is moved<br /> into the state-check block) for code simplicity.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.14.279 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.243 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.193 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.109 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.32 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.16.18 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.17 (including) 5.17.1 (excluding)