First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Fix races among concurrent prealloc proc writes We have no protection against concurrent PCM buffer preallocation changes via proc files, and it may potentially lead to UAF or some weird problem. This patch applies the PCM open_mutex to the proc write operation for avoiding the racy proc writes and the PCM stream open (and further operations).
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | <4.14.279 | |
Linux Kernel | >=4.15<4.19.243 | |
Linux Kernel | >=4.20<5.4.193 | |
Linux Kernel | >=5.5<5.10.109 | |
Linux Kernel | >=5.11<5.15.32 | |
Linux Kernel | >=5.16<5.16.18 | |
Linux Kernel | >=5.17<5.17.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49288 has been classified as a medium severity vulnerability.
To remediate CVE-2022-49288, you should update your Linux kernel to a version that includes the patch addressing this vulnerability.
CVE-2022-49288 affects various versions of the Linux Kernel between 4.15 and 5.17.1.
CVE-2022-49288 may lead to Use-After-Free (UAF) scenarios due to race conditions in concurrent PCM buffer preallocation.
CVE-2022-49288 is relevant to all distributions using affected versions of the Linux kernel.