CVE-2022-49733

Severity CVSS v4.0:
Pending analysis
Type:
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
02/03/2025
Last modified:
01/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC<br /> <br /> There is a small race window at snd_pcm_oss_sync() that is called from<br /> OSS PCM SNDCTL_DSP_SYNC ioctl; namely the function calls<br /> snd_pcm_oss_make_ready() at first, then takes the params_lock mutex<br /> for the rest. When the stream is set up again by another thread<br /> between them, it leads to inconsistency, and may result in unexpected<br /> results such as NULL dereference of OSS buffer as a fuzzer spotted<br /> recently.<br /> <br /> The fix is simply to cover snd_pcm_oss_make_ready() call into the same<br /> params_lock mutex with snd_pcm_oss_make_ready_locked() variant.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.4.215 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.148 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.68 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.19.9 (excluding)
cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*