In the Linux kernel, the following vulnerability has been resolved:
ALSA: timer: Don't take register_mutex with copy_from/to_user()
The infamous mmap_lock taken in copy_from/to_user() can be often
problematic when it's called inside another mutex, as they might lead
to deadlocks.
In the case of ALSA timer code, the bad pattern is with
guard(mutex)(®ister_mutex) that covers copy_from/to_user() -- which
was mistakenly introduced at converting to guard(), and it had been
carefully worked around in the past.
This patch fixes those pieces simply by moving copy_from/to_user() out
of the register mutex lock again.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-04-16 15:16
Updated : 2025-10-01 17:15
NVD link : CVE-2025-23134
Mitre link : CVE-2025-23134
CVE.ORG link : CVE-2025-23134
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-667
Improper Locking
