{"id":"CVE-2022-49288","summary":"ALSA: pcm: Fix races among concurrent prealloc proc writes","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Fix races among concurrent prealloc proc writes\n\nWe have no protection against concurrent PCM buffer preallocation\nchanges via proc files, and it may potentially lead to UAF or some\nweird problem.  This patch applies the PCM open_mutex to the proc\nwrite operation for avoiding the racy proc writes and the PCM stream\nopen (and further operations).","modified":"2026-04-02T08:27:28.911457Z","published":"2025-02-26T01:56:26.550Z","related":["SUSE-SU-2025:0983-1","SUSE-SU-2025:1027-1","SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1194-1","SUSE-SU-2025:1241-1","SUSE-SU-2025:1263-1","SUSE-SU-2025:1293-1","SUSE-SU-2026:0385-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49288.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/37b12c16beb6f6c1c3c678c1aacbc46525c250f7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/51fce708ab8986a9879ee5da946a2cc120f1036d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5ed8f8e3c4e59d0396b9ccf2e639711e24295bb6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/69534c48ba8ce552ce383b3dfdb271ffe51820c3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a21d2f323b5a978dedf9ff1d50f101f85e39b3f2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b560d670c87d7d40b3cf6949246fa4c7aa65a00a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e14dca613e0a6ddc2bf6e360f16936a9f865205b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e7786c445bb67a9a6e64f66ebd6b7215b153ff7d"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49288.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49288"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2"},{"fixed":"e7786c445bb67a9a6e64f66ebd6b7215b153ff7d"},{"fixed":"e14dca613e0a6ddc2bf6e360f16936a9f865205b"},{"fixed":"37b12c16beb6f6c1c3c678c1aacbc46525c250f7"},{"fixed":"b560d670c87d7d40b3cf6949246fa4c7aa65a00a"},{"fixed":"51fce708ab8986a9879ee5da946a2cc120f1036d"},{"fixed":"a21d2f323b5a978dedf9ff1d50f101f85e39b3f2"},{"fixed":"5ed8f8e3c4e59d0396b9ccf2e639711e24295bb6"},{"fixed":"69534c48ba8ce552ce383b3dfdb271ffe51820c3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49288.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}