#VU90312 Out-of-bounds read in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90312

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-48702

CWE-ID: CWE-125

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the snd_emu10k1_pcm_channel_alloc() function in sound/pci/emu10k1/emupcm.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/637c5310acb48fffcc5657568db3f3e9bc719bfa
http://git.kernel.org/stable/c/6b0e260ac3cf289e38446552461caa65e6dab275
http://git.kernel.org/stable/c/88aac6684cf8bc885cca15463cb4407e91f28ff7
http://git.kernel.org/stable/c/45321a7d02b7cf9b3f97e3987fc1e4d649b82da2
http://git.kernel.org/stable/c/39a90720f3abe96625d1224e7a7463410875de4c
http://git.kernel.org/stable/c/45814a53514e10a8014906c882e0d0d38df39cc1
http://git.kernel.org/stable/c/4204a01ffce97cae1d59edc5848f02be5b2b9178
http://git.kernel.org/stable/c/d29f59051d3a07b81281b2df2b8c9dfe4716067f


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability