CVE-2022-50547
📋 TL;DR
This CVE describes a memory leak vulnerability in the Linux kernel's solo6x10 media driver. If device_register() fails during solo_sysfs_init(), the allocated device name isn't properly freed, leading to kernel memory exhaustion over time. This affects systems using the solo6x10 driver for video capture cards.
💻 Affected Systems
- Linux kernel with solo6x10 driver enabled
⚠️ Risk & Real-World Impact
Worst Case
Sustained exploitation could cause kernel memory exhaustion leading to system instability, crashes, or denial of service requiring reboot.
Likely Case
Memory leak gradually consumes kernel memory, potentially causing performance degradation or system instability over extended periods.
If Mitigated
With proper kernel memory monitoring and restart policies, impact is limited to occasional service interruptions.
🎯 Exploit Status
Requires triggering device_register() failure in solo_sysfs_init(), which needs specific conditions and local access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commits: 49060c0da57a, 7b02c50d3978, 7cf71bbe5d2e, 7f5866dd96d9, 83d4b1ae98a4
Vendor Advisory: https://git.kernel.org/stable/c/49060c0da57a381563e482e331dc9d4c3725b41b
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. Check distribution-specific security advisories. 3. Reboot system to load patched kernel.
🔧 Temporary Workarounds
Disable solo6x10 module
linuxPrevent loading of vulnerable driver if not needed
echo 'blacklist solo6x10' >> /etc/modprobe.d/blacklist.conf
rmmod solo6x10
🧯 If You Can't Patch
- Monitor kernel memory usage for abnormal increases
- Implement system restart policies if memory exhaustion occurs
🔍 How to Verify
Check if Vulnerable:
Check if solo6x10 module is loaded: lsmod | grep solo6x10 AND check kernel version against distribution security advisories
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commits: grep -q '49060c0da57a\|7b02c50d3978\|7cf71bbe5d2e\|7f5866dd96d9\|83d4b1ae98a4' /proc/version_signature
📡 Detection & Monitoring
Log Indicators:
- Kernel oom-killer messages
- System instability logs
- Memory exhaustion warnings in dmesg
Network Indicators:
- None - local vulnerability
SIEM Query:
source="kernel" AND ("Out of memory" OR "oom-killer" OR "solo6x10")
🔗 References
- https://git.kernel.org/stable/c/49060c0da57a381563e482e331dc9d4c3725b41b
- https://git.kernel.org/stable/c/7b02c50d3978840781808e13bc13137fb81286b5
- https://git.kernel.org/stable/c/7cf71bbe5d2ee12613f6e278888f5fc9c5c0cc2b
- https://git.kernel.org/stable/c/7f5866dd96d95b74e439f6ee17b8abd8195179fb
- https://git.kernel.org/stable/c/83d4b1ae98a47a739fa5241300b86eb1110d5d63
- https://git.kernel.org/stable/c/9416861170ba0da8ddb0f4fd2d28334f0ed3b9c2
- https://git.kernel.org/stable/c/963729538674be4cb8fa292529ecf32de0d6c6dd
- https://git.kernel.org/stable/c/b61509093e1af69e336a094d439b8e1137cb40d8
- https://git.kernel.org/stable/c/d6db105bcfbdbbbd484e788a0ddf8140a4a8c486