CVE-2022-49291

Source
https://cve.org/CVERecord?id=CVE-2022-49291
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49291.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49291
Downstream
Related
Published
2025-02-26T01:56:27.986Z
Modified
2026-03-20T12:22:19.886158Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
Details

In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: Fix races among concurrent hwparams and hwfree calls

Currently we have neither proper check nor protection against the concurrent calls of PCM hwparams and hwfree ioctls, which may result in a UAF. Since the existing PCM stream lock can't be used for protecting the whole ioctl operations, we need a new mutex to protect those racy calls.

This patch introduced a new mutex, runtime->buffermutex, and applies it to both hwparams and hwfree ioctl code paths. Along with it, the both functions are slightly modified (the mmapcount check is moved into the state-check block) for code simplicity.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49291.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
a42aa926843acca96c0dfbde2e835b8137f2f092
Fixed
9cb6c40a6ebe4a0cfc9d6a181958211682cffea9
Fixed
fbeb492694ce0441053de57699e1e2b7bc148a69
Fixed
0f6947f5f5208f6ebd4d76a82a4757e2839a23f8
Fixed
33061d0fba51d2bf70a2ef9645f703c33fe8e438
Fixed
0090c13cbbdffd7da079ac56f80373a9a1be0bf8
Fixed
1bbf82d9f961414d6c76a08f7f843ea068e0ab7b
Fixed
92ee3c60ec9fe64404dc035e7c41277d74aa26cb

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49291.json"