CVE-2023-54212
Use-After-Free in Linux ALSA PCM Control Due to Missing Lock
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel ALSA subsystem involves a missing lock in the snd_ctl_elem_read function, which can lead to a use-after-free (UAF) condition. Specifically, the rwsem lock was not properly held inside snd_ctl_elem_read in certain code paths (notably 32-bit compatibility), allowing an attacker to trigger and exploit this UAF bug. The fix moves the rwsem lock inside snd_ctl_elem_read to prevent this issue.
How can this vulnerability impact me? :
The use-after-free vulnerability could potentially allow an attacker to execute arbitrary code, cause a denial of service, or escalate privileges by exploiting the improper locking in the ALSA control interface of the Linux kernel. This could compromise system stability and security.