{"uuid": "38318971-285d-48e7-8383-3c264900b15f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-49288", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5432", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-49288\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Fix races among concurrent prealloc proc writes\n\nWe have no protection against concurrent PCM buffer preallocation\nchanges via proc files, and it may potentially lead to UAF or some\nweird problem.  This patch applies the PCM open_mutex to the proc\nwrite operation for avoiding the racy proc writes and the PCM stream\nopen (and further operations).\n\ud83d\udccf Published: 2025-02-26T01:56:26.550Z\n\ud83d\udccf Modified: 2025-02-26T01:56:26.550Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/e7786c445bb67a9a6e64f66ebd6b7215b153ff7d\n2. https://git.kernel.org/stable/c/e14dca613e0a6ddc2bf6e360f16936a9f865205b\n3. https://git.kernel.org/stable/c/37b12c16beb6f6c1c3c678c1aacbc46525c250f7\n4. https://git.kernel.org/stable/c/b560d670c87d7d40b3cf6949246fa4c7aa65a00a\n5. https://git.kernel.org/stable/c/51fce708ab8986a9879ee5da946a2cc120f1036d\n6. https://git.kernel.org/stable/c/a21d2f323b5a978dedf9ff1d50f101f85e39b3f2\n7. https://git.kernel.org/stable/c/5ed8f8e3c4e59d0396b9ccf2e639711e24295bb6\n8. https://git.kernel.org/stable/c/69534c48ba8ce552ce383b3dfdb271ffe51820c3", "creation_timestamp": "2025-02-26T02:23:33.000000Z"}