CVE-2023-54072 — Time-of-check Time-of-use (TOCTOU) Race Condition in Linux
Severity
6.3MEDIUM
No vectorEPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
ALSA: pcm: Fix potential data race at PCM memory allocation helpers
The PCM memory allocation helpers have a sanity check against too many
buffer allocations. However, the check is performed without a proper
lock and the allocation isn't serialized; this allows user to allocate
more memories than predefined max size.
Practically seen, this isn't really a big problem, as it's more or
less some "soft limit" as a sanity check, a…
Affected Packages4 packages
▶CVEListV5linux/linux95b30a4312545f2dde9db12bf6a425f35d5a0d77 — 7e1d1456c8db9949459c5a24e8845cfe92430b0f+6
🔴Vulnerability Details
3GHSA▶
GHSA-xx23-73hr-9p64: In the Linux kernel, the following vulnerability has been resolved:
ALSA: pcm: Fix potential data race at PCM memory allocation helpers
The PCM memo↗2025-12-24
OSV▶
CVE-2023-54072: In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Fix potential data race at PCM memory allocation helpers The PCM memory↗2025-12-24