CVE-2022-49292
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-49292 is a buffer allocation overflow vulnerability in the Linux kernel's ALSA OSS (Open Sound System) PCM implementation. The vulnerability was discovered through syzbot reports and affects the sound subsystem's buffer allocation mechanism. The issue occurs when the PCM OSS layer allocates a temporary buffer for data conversion, where the size can become unexpectedly large when handling multiple channels or higher rates, potentially exceeding INT_MAX (Kernel Git).

Technical details

The vulnerability stems from an integer overflow in the vmalloc() allocation called from sndpcmplugalloc(). While input parameter restrictions existed, they were based only on the hwparams of the underlying PCM device. The issue manifests when the PCM OSS layer allocates temporary buffers for data conversion, particularly when dealing with multiple channels or higher rates. The fix implements a 1MB upper bound for period bytes and uses arraysize() and array3size() functions for safe multiplication operations to prevent overflow conditions (Kernel Git).

Impact

When exploited, this vulnerability could lead to buffer allocation overflows in the Linux kernel's sound subsystem. The overflow condition triggers a WARNON() when the allocation size exceeds INTMAX, potentially affecting system stability and sound processing functionality (Kernel Git).

Mitigation and workarounds

The vulnerability has been patched in the Linux kernel. The fix implements two key mitigations: 1) A 1MB upper bound limit for period bytes, which is considered sufficient for all use cases while preventing excessive buffer allocations, and 2) Implementation of arraysize() and array3size() functions for safe size calculations to prevent integer overflows. The patch has been applied to multiple kernel versions (Kernel Git).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40343MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-rt-modules-internal
NoYesDec 09, 2025
CVE-2025-40342MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-debug-modules-extra
NoYesDec 09, 2025
CVE-2025-40341MEDIUM5.1
  • Linux KernelLinux Kernel
  • linux-nvidia-tegra
NoYesDec 09, 2025
CVE-2025-40345N/AN/A
  • Linux KernelLinux Kernel
  • kernel-headers
NoYesDec 12, 2025
CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • linux-azure-6.14
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management