summaryrefslogtreecommitdiffstats
path: root/active/CVE-2022-1048
blob: 884ced57502d02d107c4e4cff3053726c785bbff (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Description: race condition in snd_pcm_hw_free leading to use-after-free
References:
 https://bugzilla.redhat.com/show_bug.cgi?id=2066706
 https://lore.kernel.org/all/20220322170720.3529-1-tiwai@suse.de/
 https://www.openwall.com/lists/oss-security/2022/03/28/4
Notes:
 carnil> Fixed as well in 5.16.18 for 5.16.y and 5.17.1 for 5.17.y.
 bwh> At least some of these races seem to have been introduced in 2.6.9 when
 bwh> the PCM ioctl implementation started dropping the BKL.
Bugs:
upstream: released (5.18-rc1) [92ee3c60ec9fe64404dc035e7c41277d74aa26cb, dca947d4d26dbf925a64a6cfb2ddbc035e831a3d, 3c3201f8c7bb77eb53b08a3ca8d9a4ddc500b4c0, 69534c48ba8ce552ce383b3dfdb271ffe51820c3]
5.10-upstream-stable: released (5.10.109) [0f6947f5f5208f6ebd4d76a82a4757e2839a23f8, 8527c8f052fb42091c6569cb928e472376a4a889, a38440f006974e693f92a1ea10f819eccc4dcc37, b560d670c87d7d40b3cf6949246fa4c7aa65a00a]
4.19-upstream-stable: released (4.19.243) [9cb6c40a6ebe4a0cfc9d6a181958211682cffea9, b3830197aa7413c65767cf5a1aa8775c83f0dbf7, 47cef5937a43a412405ea54ad6e0a91d2890493e, e14dca613e0a6ddc2bf6e360f16936a9f865205b]
4.9-upstream-stable: needed
sid: released (5.16.18-1)
5.10-bullseye-security: released (5.10.113-1)
4.19-buster-security: released (4.19.249-1)
4.9-stretch-security: ignored "EOL"

© 2014-2024 Faster IT GmbH | imprint | privacy policy