CVE-2025-38078
ALSA: pcm: Fix race of buffer access at PCM OSS layer
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Fix race of buffer access at PCM OSS layer The PCM OSS layer tries to clear the buffer with the silence data at initialization (or reconfiguration) of a stream with the explicit call of snd_pcm_format_set_silence() with runtime->dma_area. But this may lead to a UAF because the accessed runtime->dma_area might be freed concurrently, as it's performed outside the PCM ops. For avoiding it, move the code into the PCM core and perform it inside the buffer access lock, so that it won't be changed during the operation.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Jun 18, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < c0e05a76fc727929524ef24a19c302e6dd40233f 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 8170d8ec4efd0be352c14cb61f374e30fb0c2a25 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 10217da9644ae75cea7330f902c35fc5ba78bbbf 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < f3e14d706ec18faf19f5a6e75060e140fea05d4a 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 74d90875f3d43f3eff0e9861c4701418795d3455 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < bf85e49aaf3a3c5775ea87369ea5f159c2148db4 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < afa56c960fcb4db37f2e3399f28e9402e4e1f470 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 93a81ca0657758b607c3f4ba889ae806be9beb73
Linux / Linux
2.6.12
References
git.kernel.org: https://git.kernel.org/stable/c/c0e05a76fc727929524ef24a19c302e6dd40233f git.kernel.org: https://git.kernel.org/stable/c/8170d8ec4efd0be352c14cb61f374e30fb0c2a25 git.kernel.org: https://git.kernel.org/stable/c/10217da9644ae75cea7330f902c35fc5ba78bbbf git.kernel.org: https://git.kernel.org/stable/c/f3e14d706ec18faf19f5a6e75060e140fea05d4a git.kernel.org: https://git.kernel.org/stable/c/74d90875f3d43f3eff0e9861c4701418795d3455 git.kernel.org: https://git.kernel.org/stable/c/bf85e49aaf3a3c5775ea87369ea5f159c2148db4 git.kernel.org: https://git.kernel.org/stable/c/afa56c960fcb4db37f2e3399f28e9402e4e1f470 git.kernel.org: https://git.kernel.org/stable/c/93a81ca0657758b607c3f4ba889ae806be9beb73 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html