We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: ALSA: timer: Don't take register_mutex with copy_from/to_user() The infamous mmap_lock taken in copy_from/to_user() can be often problematic when it's called inside another mutex, as they might lead to deadlocks. In the case of ALSA timer code, the bad pattern is with guard(mutex)(®ister_mutex) that covers copy_from/to_user() -- which was mistakenly introduced at converting to guard(), and it had been carefully worked around in the past. This patch fixes those pieces simply by moving copy_from/to_user() out of the register mutex lock again.
Reserved 2025-01-11 | Published 2025-04-16 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/15291b561d8cc835a2eea76b394070cf8e072771
git.kernel.org/...c/296f7a9e15aab276db11206cbc1e2ae1215d7862
git.kernel.org/...c/b074f47e55df93832bbbca1b524c501e6fea1c0d
git.kernel.org/...c/3424c8f53bc63c87712a7fc22dc13d0cc85fb0d6
Support options