We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Fix race of buffer access at PCM OSS layer The PCM OSS layer tries to clear the buffer with the silence data at initialization (or reconfiguration) of a stream with the explicit call of snd_pcm_format_set_silence() with runtime->dma_area. But this may lead to a UAF because the accessed runtime->dma_area might be freed concurrently, as it's performed outside the PCM ops. For avoiding it, move the code into the PCM core and perform it inside the buffer access lock, so that it won't be changed during the operation.
Reserved 2025-04-16 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linuxgit.kernel.org/...c/c0e05a76fc727929524ef24a19c302e6dd40233f
git.kernel.org/...c/8170d8ec4efd0be352c14cb61f374e30fb0c2a25
git.kernel.org/...c/10217da9644ae75cea7330f902c35fc5ba78bbbf
git.kernel.org/...c/f3e14d706ec18faf19f5a6e75060e140fea05d4a
git.kernel.org/...c/74d90875f3d43f3eff0e9861c4701418795d3455
git.kernel.org/...c/bf85e49aaf3a3c5775ea87369ea5f159c2148db4
git.kernel.org/...c/afa56c960fcb4db37f2e3399f28e9402e4e1f470
git.kernel.org/...c/93a81ca0657758b607c3f4ba889ae806be9beb73
Support options