CVE-2022-49272

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49272
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49272.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49272
Downstream
Related
Published
2025-02-26T01:56:18Z
Modified
2025-10-15T21:42:19.041332Z
Summary
ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock
Details

In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: Fix potential AB/BA lock with buffermutex and mmaplock

syzbot caught a potential deadlock between the PCM runtime->buffermutex and the mm->mmaplock. It was brought by the recent fix to cover the racy read/write and other ioctls, and in that commit, I overlooked a (hopefully only) corner case that may take the revert lock, namely, the OSS mmap. The OSS mmap operation exceptionally allows to re-configure the parameters inside the OSS mmap syscall, where mm->mmapmutex is already held. Meanwhile, the copyfrom/touser calls at read/write operations also take the mm->mmaplock internally, hence it may lead to a AB/BA deadlock.

A similar problem was already seen in the past and we fixed it with a refcount (in commit b248371628aa). The former fix covered only the call paths with OSS read/write and OSS ioctls, while we need to cover the concurrent access via both ALSA and OSS APIs now.

This patch addresses the problem above by replacing the buffermutex lock in the read/write operations with a refcount similar as we've used for OSS. The new field, runtime->bufferaccessing, keeps the number of concurrent read/write operations. Unlike the former buffermutex protection, this protects only around the copyfrom/to_user() calls; the other codes are basically protected by the PCM stream lock. The refcount can be a negative, meaning blocked by the ioctls. If a negative value is seen, the read/write aborts with -EBUSY. In the ioctl side, OTOH, they check this refcount, too, and set to a negative value for blocking unless it's already being accessed.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
73867cb2bc7dfa7fbd219e53a0b68d253d8fda09
Fixed
7e9133607e1501c94881be35e118d8f84d96dcb4
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b3830197aa7413c65767cf5a1aa8775c83f0dbf7
Fixed
40f4cffbe13a51faf136faf5f9ef6847782cd595
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
08d1807f097a63ea00a7067dad89c1c81cb2115e
Fixed
9661bf674d6a82b76e4ae424438a8ce1e3ed855d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8527c8f052fb42091c6569cb928e472376a4a889
Fixed
9017201e8d8c6d1472273361389ed431188584a0
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
47711ff10c7e126702cfa725f6d86ef529d15a5f
Fixed
7777744e92a0b30e3e0cce2758d911837011ebd9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4d1b0ace2d56dc27cc4921eda7fae57f77f03eb5
Fixed
abedf0d08c79d76da0d6fa0d5dbbc98871dcbc2e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
dd2f8c684da3e226e5ec7a81c89ff5fd4a957a03
Fixed
be9813ad2fc8f0885f5ce6925af0d993ce5da4e5
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
dca947d4d26dbf925a64a6cfb2ddbc035e831a3d
Fixed
bc55cfd5718c7c23e5524582e9fa70b4d10f2433

Affected versions

v5.*

v5.10.109
v5.15.32
v5.16.18
v5.17.1

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.10.109
Fixed
5.10.110
Type
ECOSYSTEM
Events
Introduced
5.15.32
Fixed
5.15.33
Type
ECOSYSTEM
Events
Introduced
5.16.18
Fixed
5.16.19
Type
ECOSYSTEM
Events
Introduced
5.17.1
Fixed
5.17.2