#VU90312 Out-of-bounds read in Linux kernel - CVE-2022-48702


Vulnerability identifier: #VU90312

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48702

CWE-ID: CWE-125

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the snd_emu10k1_pcm_channel_alloc() function in sound/pci/emu10k1/emupcm.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/637c5310acb48fffcc5657568db3f3e9bc719bfa
https://git.kernel.org/stable/c/6b0e260ac3cf289e38446552461caa65e6dab275
https://git.kernel.org/stable/c/88aac6684cf8bc885cca15463cb4407e91f28ff7
https://git.kernel.org/stable/c/45321a7d02b7cf9b3f97e3987fc1e4d649b82da2
https://git.kernel.org/stable/c/39a90720f3abe96625d1224e7a7463410875de4c
https://git.kernel.org/stable/c/45814a53514e10a8014906c882e0d0d38df39cc1
https://git.kernel.org/stable/c/4204a01ffce97cae1d59edc5848f02be5b2b9178
https://git.kernel.org/stable/c/d29f59051d3a07b81281b2df2b8c9dfe4716067f


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability