CVE-2022-49493

7.8 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in the Linux kernel's rt5645 audio codec driver. The improper cleanup order during device removal could allow attackers to trigger memory corruption, potentially leading to system crashes or privilege escalation. This affects Linux systems using the rt5645 audio hardware.

💻 Affected Systems

Products:
  • Linux kernel with rt5645 audio codec driver
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with rt5645 audio hardware present. The vulnerability is triggered during device removal operations.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic, system crash, or local privilege escalation to root if an attacker can trigger the race condition and execute arbitrary code.

🟠

Likely Case

System instability, kernel crashes, or denial of service affecting audio functionality.

🟢

If Mitigated

Minimal impact if proper access controls prevent unprivileged users from accessing audio device removal functions.

🌐 Internet-Facing: LOW - This requires local access to trigger the race condition during device removal.
🏢 Internal Only: MEDIUM - Local users or processes with sufficient privileges could exploit this to cause system instability or potentially escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering a specific race condition during device removal, which requires local access and timing precision.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel versions containing the fix commits (061a6159cea583f1155f67d1915917a6b9282662 and related)

Vendor Advisory: https://git.kernel.org/stable/c/061a6159cea583f1155f67d1915917a6b9282662

Restart Required: No

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager to update kernel package. 3. Rebuild kernel if using custom kernel with the fix patches applied.

🔧 Temporary Workarounds

Disable rt5645 module

all

Prevent loading of the vulnerable rt5645 kernel module

echo 'blacklist snd-soc-rt5645' >> /etc/modprobe.d/blacklist-rt5645.conf
rmmod snd-soc-rt5645

🧯 If You Can't Patch

  • Restrict access to audio device management functions to privileged users only
  • Monitor system logs for kernel crashes or audio device removal events

🔍 How to Verify

Check if Vulnerable:

Check if rt5645 module is loaded: lsmod | grep rt5645 AND check kernel version against patched versions

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits or is newer than vulnerable versions

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • Audio device removal errors in dmesg
  • Use-after-free kernel warnings

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Search for kernel panic events or audio device removal errors in system logs

🔗 References

📤 Share & Export