{"id":"CVE-2023-54072","summary":"ALSA: pcm: Fix potential data race at PCM memory allocation helpers","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Fix potential data race at PCM memory allocation helpers\n\nThe PCM memory allocation helpers have a sanity check against too many\nbuffer allocations.  However, the check is performed without a proper\nlock and the allocation isn't serialized; this allows user to allocate\nmore memories than predefined max size.\n\nPractically seen, this isn't really a big problem, as it's more or\nless some \"soft limit\" as a sanity check, and it's not possible to\nallocate unlimitedly.  But it's still better to address this for more\nconsistent behavior.\n\nThe patch covers the size check in do_alloc_pages() with the\ncard-\u003ememory_mutex, and increases the allocated size there for\npreventing the further overflow.  When the actual allocation fails,\nthe size is decreased accordingly.","modified":"2026-04-02T09:45:33.716727Z","published":"2025-12-24T12:23:15.552Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54072.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3eb4e47a94e3f76521d7d344696db61e6a9619c7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/773ccad902f67583a58b5650a2f8d8daf2e76fac"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7e11c58b2620a22c67a5ae28d64ce383890ee9f4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7e1d1456c8db9949459c5a24e8845cfe92430b0f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a0ab49e7a758b488b2090171a75d50735c0876f6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bd55842ed998a622ba6611fe59b3358c9f76773d"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54072.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54072"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"95b30a4312545f2dde9db12bf6a425f35d5a0d77"},{"fixed":"7e1d1456c8db9949459c5a24e8845cfe92430b0f"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d4cfb30fce03093ad944e0b44bd8f40bdad5330e"},{"fixed":"7e11c58b2620a22c67a5ae28d64ce383890ee9f4"},{"fixed":"a0ab49e7a758b488b2090171a75d50735c0876f6"},{"fixed":"3eb4e47a94e3f76521d7d344696db61e6a9619c7"},{"fixed":"773ccad902f67583a58b5650a2f8d8daf2e76fac"},{"fixed":"bd55842ed998a622ba6611fe59b3358c9f76773d"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54072.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.6.0"},{"fixed":"5.10.193"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.129"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.39"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54072.json"}}],"schema_version":"1.7.5"}