First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Fix races among concurrent hw_params and hw_free calls Currently we have neither proper check nor protection against the concurrent calls of PCM hw_params and hw_free ioctls, which may result in a UAF. Since the existing PCM stream lock can't be used for protecting the whole ioctl operations, we need a new mutex to protect those racy calls. This patch introduced a new mutex, runtime->buffer_mutex, and applies it to both hw_params and hw_free ioctl code paths. Along with it, the both functions are slightly modified (the mmap_count check is moved into the state-check block) for code simplicity.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | <4.14.279 | |
Linux Kernel | >=4.15<4.19.243 | |
Linux Kernel | >=4.20<5.4.193 | |
Linux Kernel | >=5.5<5.10.109 | |
Linux Kernel | >=5.11<5.15.32 | |
Linux Kernel | >=5.16<5.16.18 | |
Linux Kernel | >=5.17<5.17.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49291 has been classified as a high severity vulnerability due to the potential for a use-after-free condition.
To fix CVE-2022-49291, update the Linux kernel to a version that includes the patch addressing the race conditions in ALSA PCM.
CVE-2022-49291 affects multiple versions of the Linux kernel, particularly those up to 4.14.279 and in the ranges of 4.15 to 4.19.243, 4.20 to 5.4.193, 5.5 to 5.10.109, 5.11 to 5.15.32, 5.16 to 5.16.18, and 5.17 to 5.17.1.
CVE-2022-49291 specifically impacts the ALSA PCM subsystem in the Linux kernel.
CVE-2022-49291 may be exploited locally, particularly by processes with sufficient privileges to invoke ALSA PCM functionality.