CVE-2022-49292
📋 TL;DR
This CVE describes an integer overflow vulnerability in the Linux kernel's ALSA OSS PCM layer that can cause kernel memory allocation failures. Attackers could trigger a denial-of-service (system crash) by manipulating audio parameters to allocate excessively large buffers. Systems running vulnerable Linux kernel versions with OSS audio emulation enabled are affected.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic or system crash due to failed memory allocation, leading to complete denial-of-service.
Likely Case
System instability or crash when processing malformed audio parameters through OSS interface.
If Mitigated
Minimal impact if OSS audio emulation is disabled or systems are patched.
🎯 Exploit Status
Exploitation requires ability to influence PCM audio parameters through applications using OSS interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel versions containing commits: 0c4190b41a69990666b4000999e27f8f1b2a426b, 5ce74ff7059341d8b2f4d01c3383491df63d1898, 7a40cbf3579a8e14849ba7ce46309c1992658d2b, a63af1baf0a5e11827db60e3127f87e437cab6e5, e74a069c6a7bb505f3ade141dddf85f4b0b5145a
Vendor Advisory: https://git.kernel.org/stable/c/0c4190b41a69990666b4000999e27f8f1b2a426b
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable OSS audio emulation
LinuxDisable CONFIG_SND_PCM_OSS kernel module to remove vulnerable code path
echo 'blacklist snd-pcm-oss' >> /etc/modprobe.d/blacklist.conf
rmmod snd-pcm-oss
🧯 If You Can't Patch
- Disable OSS audio emulation via kernel module blacklisting
- Restrict audio device access to trusted users only
🔍 How to Verify
Check if Vulnerable:
Check if OSS PCM module is loaded: lsmod | grep snd-pcm-oss
Check Version:
uname -r
Verify Fix Applied:
Check kernel version contains fix commits or is newer than vulnerable versions
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- WARN_ON() messages related to vmalloc allocation
- System crash/reboot logs
Network Indicators:
- None - local vulnerability
SIEM Query:
Search for kernel panic events or system crash reports
🔗 References
- https://git.kernel.org/stable/c/0c4190b41a69990666b4000999e27f8f1b2a426b
- https://git.kernel.org/stable/c/5ce74ff7059341d8b2f4d01c3383491df63d1898
- https://git.kernel.org/stable/c/7a40cbf3579a8e14849ba7ce46309c1992658d2b
- https://git.kernel.org/stable/c/a63af1baf0a5e11827db60e3127f87e437cab6e5
- https://git.kernel.org/stable/c/e74a069c6a7bb505f3ade141dddf85f4b0b5145a
- https://git.kernel.org/stable/c/efb6402c3c4a7c26d97c92d70186424097b6e366
- https://git.kernel.org/stable/c/fb08bf99195a87c798bc8ae1357337a981faeade