#VU104929 Input validation error in Linux kernel - CVE-2022-49250


Vulnerability identifier: #VU104929

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49250

CWE-ID: CWE-20

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the rx_macro_load_compander_coeff() function in sound/soc/codecs/lpass-rx-macro.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/42c709c4e1ce4c136891530646c9abd5dff3524f
https://git.kernel.org/stable/c/6aa8ef9535dbd561293406608ebe791627b10196
https://git.kernel.org/stable/c/87a2b44cb3005d30c3a72234d1e47b03ae3bb29a
https://git.kernel.org/stable/c/9208ecc703b5ed5b12d7ea13c79207f4c8456638


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability