First published: Wed Apr 16 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ALSA: timer: Don't take register_mutex with copy_from/to_user() The infamous mmap_lock taken in copy_from/to_user() can be often problematic when it's called inside another mutex, as they might lead to deadlocks. In the case of ALSA timer code, the bad pattern is with guard(mutex)(®ister_mutex) that covers copy_from/to_user() -- which was mistakenly introduced at converting to guard(), and it had been carefully worked around in the past. This patch fixes those pieces simply by moving copy_from/to_user() out of the register mutex lock again.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-23134 is classified as a moderate severity vulnerability due to the potential for deadlocks in the Linux kernel.
To fix CVE-2025-23134, ensure you update to the latest patched version of the Linux kernel provided by your distribution.
CVE-2025-23134 affects various versions of the Linux kernel that implement ALSA timer functions.
CVE-2025-23134 is a concurrency-related vulnerability that can lead to deadlocks during user data transfers.
As of now, there have been no reports indicating that CVE-2025-23134 is actively being exploited in the wild.