We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38078

ALSA: pcm: Fix race of buffer access at PCM OSS layer



Description

In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Fix race of buffer access at PCM OSS layer The PCM OSS layer tries to clear the buffer with the silence data at initialization (or reconfiguration) of a stream with the explicit call of snd_pcm_format_set_silence() with runtime->dma_area. But this may lead to a UAF because the accessed runtime->dma_area might be freed concurrently, as it's performed outside the PCM ops. For avoiding it, move the code into the PCM core and perform it inside the buffer access lock, so that it won't be changed during the operation.

Reserved 2025-04-16 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before c0e05a76fc727929524ef24a19c302e6dd40233f
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 8170d8ec4efd0be352c14cb61f374e30fb0c2a25
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 10217da9644ae75cea7330f902c35fc5ba78bbbf
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before f3e14d706ec18faf19f5a6e75060e140fea05d4a
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 74d90875f3d43f3eff0e9861c4701418795d3455
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before bf85e49aaf3a3c5775ea87369ea5f159c2148db4
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before afa56c960fcb4db37f2e3399f28e9402e4e1f470
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 93a81ca0657758b607c3f4ba889ae806be9beb73
affected

Default status
affected

5.4.294
unaffected

5.10.238
unaffected

5.15.185
unaffected

6.1.141
unaffected

6.6.93
unaffected

6.12.31
unaffected

6.14.9
unaffected

6.15
unaffected

References

git.kernel.org/...c/c0e05a76fc727929524ef24a19c302e6dd40233f

git.kernel.org/...c/8170d8ec4efd0be352c14cb61f374e30fb0c2a25

git.kernel.org/...c/10217da9644ae75cea7330f902c35fc5ba78bbbf

git.kernel.org/...c/f3e14d706ec18faf19f5a6e75060e140fea05d4a

git.kernel.org/...c/74d90875f3d43f3eff0e9861c4701418795d3455

git.kernel.org/...c/bf85e49aaf3a3c5775ea87369ea5f159c2148db4

git.kernel.org/...c/afa56c960fcb4db37f2e3399f28e9402e4e1f470

git.kernel.org/...c/93a81ca0657758b607c3f4ba889ae806be9beb73

cve.org (CVE-2025-38078)

nvd.nist.gov (CVE-2025-38078)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38078

Support options

Helpdesk Chat, Email, Knowledgebase