CVE-2022-49252

7.1 HIGH

📋 TL;DR

This CVE involves an out-of-bounds array access vulnerability in the Linux kernel's ASoC rx-macro codec driver. On 64-bit ARM (aarch64) systems, improper enum handling could allow memory corruption, potentially leading to system crashes or privilege escalation. Affected systems are those running vulnerable Linux kernel versions with the rx-macro codec enabled.

💻 Affected Systems

Products:
  • Linux kernel with ASoC rx-macro codec driver
Versions: Specific kernel versions containing the vulnerable commit until patched versions
Operating Systems: Linux distributions running on ARM64 (aarch64) architecture
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when rx-macro codec driver is loaded and active, primarily affects ARM64 systems due to sizeof(long) differences.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to denial of service, or potential privilege escalation to kernel mode allowing complete system compromise.

🟠

Likely Case

System crash or instability when specific audio operations are performed on affected ARM64 systems.

🟢

If Mitigated

No impact if the vulnerable codec driver is not loaded or the system is not ARM64 architecture.

🌐 Internet-Facing: LOW - This is a kernel-level vulnerability requiring local access or specific audio operations.
🏢 Internal Only: MEDIUM - Could be exploited by authenticated users or through malicious audio applications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering specific audio operations on vulnerable ARM64 systems with the affected driver loaded.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing fixes from the provided git commits

Vendor Advisory: https://git.kernel.org/stable/c/7e3629e256d1cabf801d00050550ade4d036cafe

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. Rebuild kernel if compiling from source. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable rx-macro codec module

linux

Prevent loading of the vulnerable driver module

echo 'blacklist snd_soc_rx_macro' >> /etc/modprobe.d/blacklist.conf
rmmod snd_soc_rx_macro

🧯 If You Can't Patch

  • Restrict user access to audio devices and operations
  • Implement strict application control to prevent unauthorized audio applications

🔍 How to Verify

Check if Vulnerable:

Check if rx-macro module is loaded: lsmod | grep rx_macro AND check kernel version against vulnerable range

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated beyond vulnerable commits and rx-macro module loads without errors

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • System crashes during audio operations
  • dmesg errors mentioning rx_macro

Network Indicators:

  • None - local vulnerability

SIEM Query:

source="kernel" AND ("oops" OR "panic") AND "rx_macro"

🔗 References

📤 Share & Export