lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025022614-CVE-2022-49538-c7b9@gregkh>
Date: Wed, 26 Feb 2025 03:13:32 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2022-49538: ALSA: jack: Access input_dev under mutex

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

ALSA: jack: Access input_dev under mutex

It is possible when using ASoC that input_dev is unregistered while
calling snd_jack_report, which causes NULL pointer dereference.
In order to prevent this serialize access to input_dev using mutex lock.

The Linux kernel CVE team has assigned CVE-2022-49538 to this issue.


Affected and fixed versions
===========================

	Fixed in 4.9.318 with commit 74bab3bcf422593c582e47130aa8eb41ebb2dc09
	Fixed in 4.14.283 with commit 8487a88136d54a1a4d3f26f1399685db648ab879
	Fixed in 4.19.247 with commit c093b62c40027c21d649c5534ad7aa3605a99b00
	Fixed in 5.4.198 with commit f68bed124c7699e23ffb4ce4fcc84671e9193cde
	Fixed in 5.10.121 with commit e2b8681769f6e205382f026b907d28aa5ec9d59a
	Fixed in 5.15.46 with commit 5cc6f623f4818c7d7e9e966a45ebf324901ca9c5
	Fixed in 5.17.14 with commit 9e6a73b0c0f2014eb89249fb1640c5a3d58221c4
	Fixed in 5.18.3 with commit 582aea6084cc59fec881204f026816d1219f2348
	Fixed in 5.19 with commit 1b6a6fc5280e97559287b61eade2d4b363e836f2

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2022-49538
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	include/sound/jack.h
	sound/core/jack.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/74bab3bcf422593c582e47130aa8eb41ebb2dc09
	https://git.kernel.org/stable/c/8487a88136d54a1a4d3f26f1399685db648ab879
	https://git.kernel.org/stable/c/c093b62c40027c21d649c5534ad7aa3605a99b00
	https://git.kernel.org/stable/c/f68bed124c7699e23ffb4ce4fcc84671e9193cde
	https://git.kernel.org/stable/c/e2b8681769f6e205382f026b907d28aa5ec9d59a
	https://git.kernel.org/stable/c/5cc6f623f4818c7d7e9e966a45ebf324901ca9c5
	https://git.kernel.org/stable/c/9e6a73b0c0f2014eb89249fb1640c5a3d58221c4
	https://git.kernel.org/stable/c/582aea6084cc59fec881204f026816d1219f2348
	https://git.kernel.org/stable/c/1b6a6fc5280e97559287b61eade2d4b363e836f2

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ