Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2023-54072

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/12/2025
Última modificación:
24/12/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ALSA: pcm: Fix potential data race at PCM memory allocation helpers<br /> <br /> The PCM memory allocation helpers have a sanity check against too many<br /> buffer allocations. However, the check is performed without a proper<br /> lock and the allocation isn&amp;#39;t serialized; this allows user to allocate<br /> more memories than predefined max size.<br /> <br /> Practically seen, this isn&amp;#39;t really a big problem, as it&amp;#39;s more or<br /> less some "soft limit" as a sanity check, and it&amp;#39;s not possible to<br /> allocate unlimitedly. But it&amp;#39;s still better to address this for more<br /> consistent behavior.<br /> <br /> The patch covers the size check in do_alloc_pages() with the<br /> card-&gt;memory_mutex, and increases the allocated size there for<br /> preventing the further overflow. When the actual allocation fails,<br /> the size is decreased accordingly.

Impacto