CVE-2025-38078

Source
https://cve.org/CVERecord?id=CVE-2025-38078
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38078.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38078
Downstream
Related
Published
2025-06-18T09:33:52.644Z
Modified
2026-03-20T12:42:39.239501Z
Summary
ALSA: pcm: Fix race of buffer access at PCM OSS layer
Details

In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: Fix race of buffer access at PCM OSS layer

The PCM OSS layer tries to clear the buffer with the silence data at initialization (or reconfiguration) of a stream with the explicit call of sndpcmformatsetsilence() with runtime->dmaarea. But this may lead to a UAF because the accessed runtime->dmaarea might be freed concurrently, as it's performed outside the PCM ops.

For avoiding it, move the code into the PCM core and perform it inside the buffer access lock, so that it won't be changed during the operation.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38078.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
c0e05a76fc727929524ef24a19c302e6dd40233f
Fixed
8170d8ec4efd0be352c14cb61f374e30fb0c2a25
Fixed
10217da9644ae75cea7330f902c35fc5ba78bbbf
Fixed
f3e14d706ec18faf19f5a6e75060e140fea05d4a
Fixed
74d90875f3d43f3eff0e9861c4701418795d3455
Fixed
bf85e49aaf3a3c5775ea87369ea5f159c2148db4
Fixed
afa56c960fcb4db37f2e3399f28e9402e4e1f470
Fixed
93a81ca0657758b607c3f4ba889ae806be9beb73

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38078.json"