CVE-2022-48702: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() The voice allocator sometimes begins allocating from near the end of the array and then wraps around, however snd_emu10k1_pcm_channel_alloc() accesses the newly allocated voices as if it never wrapped around. This results in out of bounds access if the first voice has a high enough index so that first_voice + requested_voice_count > NUM_G (64). The more voices are requested, the more likely it is for this to occur. This was initially discovered using PipeWire, however it can be reproduced by calling aplay multiple times with 16 channels: aplay -r 48000 -D plughw:CARD=Live,DEV=3 -c 16 /dev/zero UBSAN: array-index-out-of-bounds in sound/pci/emu10k1/emupcm.c:127:40 index 65 is out of range for type 'snd_emu10k1_voice [64]' CPU: 1 PID: 31977 Comm: aplay Tainted: G W IOE 6.0.0-rc2-emu10k1+ #7 Hardware name: ASUSTEK COMPUTER INC P5W DH Deluxe/P5W DH Deluxe, BIOS 3002 07/22/2010 Call Trace: <TASK> dump_stack_lvl+0x49/0x63 dump_stack+0x10/0x16 ubsan_epilogue+0x9/0x3f __ubsan_handle_out_of_bounds.cold+0x44/0x49 snd_emu10k1_playback_hw_params+0x3bc/0x420 [snd_emu10k1] snd_pcm_hw_params+0x29f/0x600 [snd_pcm] snd_pcm_common_ioctl+0x188/0x1410 [snd_pcm] ? exit_to_user_mode_prepare+0x35/0x170 ? do_syscall_64+0x69/0x90 ? syscall_exit_to_user_mode+0x26/0x50 ? do_syscall_64+0x69/0x90 ? exit_to_user_mode_prepare+0x35/0x170 snd_pcm_ioctl+0x27/0x40 [snd_pcm] __x64_sys_ioctl+0x95/0xd0 do_syscall_64+0x5c/0x90 ? do_syscall_64+0x69/0x90 ? do_syscall_64+0x69/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd
AI Analysis
Technical Summary
CVE-2022-48702 is a vulnerability identified in the Linux kernel's ALSA (Advanced Linux Sound Architecture) emu10k1 driver, specifically within the snd_emu10k1_pcm_channel_alloc() function. This function is responsible for allocating audio voices (channels) for the emu10k1 sound card chipset. The vulnerability arises due to an out-of-bounds array access caused by improper handling of voice allocation wrapping. The voice allocator sometimes starts allocating near the end of the voice array and wraps around to the beginning. However, snd_emu10k1_pcm_channel_alloc() incorrectly accesses the allocated voices as if no wrap-around occurred, leading to an out-of-bounds read/write when the sum of the first voice index and the requested voice count exceeds the maximum number of voices (64). This flaw can be triggered by requesting multiple audio channels, for example, by running the 'aplay' utility multiple times with 16 channels. The issue was initially discovered using PipeWire, a modern audio server, but can be reproduced with ALSA utilities. The out-of-bounds access is detected by UBSAN (Undefined Behavior Sanitizer) as an array index out-of-bounds error. While the vulnerability does not have known exploits in the wild, it could potentially lead to memory corruption, causing system instability, crashes, or possibly privilege escalation if exploited. The vulnerability affects Linux kernel versions prior to the patch that fixes this out-of-bounds access in the emu10k1 driver. The flaw is specific to the emu10k1 sound card driver, which is used in certain hardware configurations. No CVSS score has been assigned yet, but the vulnerability is significant due to its potential to cause kernel-level memory corruption.
Potential Impact
For European organizations, the impact of CVE-2022-48702 depends largely on the deployment of Linux systems using the emu10k1 sound driver. Organizations running Linux servers or workstations with this driver enabled could experience system crashes or kernel panics, leading to denial of service. In environments where audio hardware is used for critical applications (e.g., media production, telecommunication, or embedded systems), this vulnerability could disrupt operations. Although no known exploits exist, the potential for memory corruption raises concerns about privilege escalation or arbitrary code execution, which could compromise system confidentiality and integrity. Given the Linux kernel's widespread use in European enterprises, public sector, and critical infrastructure, unpatched systems could be at risk. However, the vulnerability's impact is somewhat limited by the requirement to interact with the audio subsystem and the specific hardware dependency. Nonetheless, targeted attackers could leverage this flaw in multi-user environments or on systems where untrusted users have access to audio device interfaces.
Mitigation Recommendations
To mitigate CVE-2022-48702, European organizations should prioritize updating their Linux kernels to versions that include the patch fixing the out-of-bounds access in the emu10k1 driver. Kernel updates should be applied promptly, especially on systems with emu10k1 hardware or where the driver is loaded. System administrators should audit their hardware inventory to identify affected sound cards and disable or blacklist the emu10k1 driver if audio functionality is not required, reducing the attack surface. Additionally, restricting access to audio devices to trusted users only can limit exploitation opportunities. Employing security modules such as SELinux or AppArmor to confine audio subsystem interactions can further reduce risk. Monitoring system logs for unusual kernel warnings or crashes related to snd_emu10k1 can help detect exploitation attempts. Finally, organizations should incorporate this vulnerability into their vulnerability management and patching workflows to ensure timely remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain, Belgium
CVE-2022-48702: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() The voice allocator sometimes begins allocating from near the end of the array and then wraps around, however snd_emu10k1_pcm_channel_alloc() accesses the newly allocated voices as if it never wrapped around. This results in out of bounds access if the first voice has a high enough index so that first_voice + requested_voice_count > NUM_G (64). The more voices are requested, the more likely it is for this to occur. This was initially discovered using PipeWire, however it can be reproduced by calling aplay multiple times with 16 channels: aplay -r 48000 -D plughw:CARD=Live,DEV=3 -c 16 /dev/zero UBSAN: array-index-out-of-bounds in sound/pci/emu10k1/emupcm.c:127:40 index 65 is out of range for type 'snd_emu10k1_voice [64]' CPU: 1 PID: 31977 Comm: aplay Tainted: G W IOE 6.0.0-rc2-emu10k1+ #7 Hardware name: ASUSTEK COMPUTER INC P5W DH Deluxe/P5W DH Deluxe, BIOS 3002 07/22/2010 Call Trace: <TASK> dump_stack_lvl+0x49/0x63 dump_stack+0x10/0x16 ubsan_epilogue+0x9/0x3f __ubsan_handle_out_of_bounds.cold+0x44/0x49 snd_emu10k1_playback_hw_params+0x3bc/0x420 [snd_emu10k1] snd_pcm_hw_params+0x29f/0x600 [snd_pcm] snd_pcm_common_ioctl+0x188/0x1410 [snd_pcm] ? exit_to_user_mode_prepare+0x35/0x170 ? do_syscall_64+0x69/0x90 ? syscall_exit_to_user_mode+0x26/0x50 ? do_syscall_64+0x69/0x90 ? exit_to_user_mode_prepare+0x35/0x170 snd_pcm_ioctl+0x27/0x40 [snd_pcm] __x64_sys_ioctl+0x95/0xd0 do_syscall_64+0x5c/0x90 ? do_syscall_64+0x69/0x90 ? do_syscall_64+0x69/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd
AI-Powered Analysis
Technical Analysis
CVE-2022-48702 is a vulnerability identified in the Linux kernel's ALSA (Advanced Linux Sound Architecture) emu10k1 driver, specifically within the snd_emu10k1_pcm_channel_alloc() function. This function is responsible for allocating audio voices (channels) for the emu10k1 sound card chipset. The vulnerability arises due to an out-of-bounds array access caused by improper handling of voice allocation wrapping. The voice allocator sometimes starts allocating near the end of the voice array and wraps around to the beginning. However, snd_emu10k1_pcm_channel_alloc() incorrectly accesses the allocated voices as if no wrap-around occurred, leading to an out-of-bounds read/write when the sum of the first voice index and the requested voice count exceeds the maximum number of voices (64). This flaw can be triggered by requesting multiple audio channels, for example, by running the 'aplay' utility multiple times with 16 channels. The issue was initially discovered using PipeWire, a modern audio server, but can be reproduced with ALSA utilities. The out-of-bounds access is detected by UBSAN (Undefined Behavior Sanitizer) as an array index out-of-bounds error. While the vulnerability does not have known exploits in the wild, it could potentially lead to memory corruption, causing system instability, crashes, or possibly privilege escalation if exploited. The vulnerability affects Linux kernel versions prior to the patch that fixes this out-of-bounds access in the emu10k1 driver. The flaw is specific to the emu10k1 sound card driver, which is used in certain hardware configurations. No CVSS score has been assigned yet, but the vulnerability is significant due to its potential to cause kernel-level memory corruption.
Potential Impact
For European organizations, the impact of CVE-2022-48702 depends largely on the deployment of Linux systems using the emu10k1 sound driver. Organizations running Linux servers or workstations with this driver enabled could experience system crashes or kernel panics, leading to denial of service. In environments where audio hardware is used for critical applications (e.g., media production, telecommunication, or embedded systems), this vulnerability could disrupt operations. Although no known exploits exist, the potential for memory corruption raises concerns about privilege escalation or arbitrary code execution, which could compromise system confidentiality and integrity. Given the Linux kernel's widespread use in European enterprises, public sector, and critical infrastructure, unpatched systems could be at risk. However, the vulnerability's impact is somewhat limited by the requirement to interact with the audio subsystem and the specific hardware dependency. Nonetheless, targeted attackers could leverage this flaw in multi-user environments or on systems where untrusted users have access to audio device interfaces.
Mitigation Recommendations
To mitigate CVE-2022-48702, European organizations should prioritize updating their Linux kernels to versions that include the patch fixing the out-of-bounds access in the emu10k1 driver. Kernel updates should be applied promptly, especially on systems with emu10k1 hardware or where the driver is loaded. System administrators should audit their hardware inventory to identify affected sound cards and disable or blacklist the emu10k1 driver if audio functionality is not required, reducing the attack surface. Additionally, restricting access to audio devices to trusted users only can limit exploitation opportunities. Employing security modules such as SELinux or AppArmor to confine audio subsystem interactions can further reduce risk. Monitoring system logs for unusual kernel warnings or crashes related to snd_emu10k1 can help detect exploitation attempts. Finally, organizations should incorporate this vulnerability into their vulnerability management and patching workflows to ensure timely remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-03T14:55:07.146Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ec4522896dcbe5ed5
Added to database: 5/21/2025, 9:09:02 AM
Last enriched: 6/30/2025, 7:12:38 PM
Last updated: 8/12/2025, 8:19:05 AM
Views: 17
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.