Skip to main content

CVE-2022-48803: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-48803cvecve-2022-48803
Published: Tue Jul 16 2024 (07/16/2024, 11:43:55 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: phy: ti: Fix missing sentinel for clk_div_table _get_table_maxdiv() tries to access "clk_div_table" array out of bound defined in phy-j721e-wiz.c. Add a sentinel entry to prevent the following global-out-of-bounds error reported by enabling KASAN. [ 9.552392] BUG: KASAN: global-out-of-bounds in _get_maxdiv+0xc0/0x148 [ 9.558948] Read of size 4 at addr ffff8000095b25a4 by task kworker/u4:1/38 [ 9.565926] [ 9.567441] CPU: 1 PID: 38 Comm: kworker/u4:1 Not tainted 5.16.0-116492-gdaadb3bd0e8d-dirty #360 [ 9.576242] Hardware name: Texas Instruments J721e EVM (DT) [ 9.581832] Workqueue: events_unbound deferred_probe_work_func [ 9.587708] Call trace: [ 9.590174] dump_backtrace+0x20c/0x218 [ 9.594038] show_stack+0x18/0x68 [ 9.597375] dump_stack_lvl+0x9c/0xd8 [ 9.601062] print_address_description.constprop.0+0x78/0x334 [ 9.606830] kasan_report+0x1f0/0x260 [ 9.610517] __asan_load4+0x9c/0xd8 [ 9.614030] _get_maxdiv+0xc0/0x148 [ 9.617540] divider_determine_rate+0x88/0x488 [ 9.622005] divider_round_rate_parent+0xc8/0x124 [ 9.626729] wiz_clk_div_round_rate+0x54/0x68 [ 9.631113] clk_core_determine_round_nolock+0x124/0x158 [ 9.636448] clk_core_round_rate_nolock+0x68/0x138 [ 9.641260] clk_core_set_rate_nolock+0x268/0x3a8 [ 9.645987] clk_set_rate+0x50/0xa8 [ 9.649499] cdns_sierra_phy_init+0x88/0x248 [ 9.653794] phy_init+0x98/0x108 [ 9.657046] cdns_pcie_enable_phy+0xa0/0x170 [ 9.661340] cdns_pcie_init_phy+0x250/0x2b0 [ 9.665546] j721e_pcie_probe+0x4b8/0x798 [ 9.669579] platform_probe+0x8c/0x108 [ 9.673350] really_probe+0x114/0x630 [ 9.677037] __driver_probe_device+0x18c/0x220 [ 9.681505] driver_probe_device+0xac/0x150 [ 9.685712] __device_attach_driver+0xec/0x170 [ 9.690178] bus_for_each_drv+0xf0/0x158 [ 9.694124] __device_attach+0x184/0x210 [ 9.698070] device_initial_probe+0x14/0x20 [ 9.702277] bus_probe_device+0xec/0x100 [ 9.706223] deferred_probe_work_func+0x124/0x180 [ 9.710951] process_one_work+0x4b0/0xbc0 [ 9.714983] worker_thread+0x74/0x5d0 [ 9.718668] kthread+0x214/0x230 [ 9.721919] ret_from_fork+0x10/0x20 [ 9.725520] [ 9.727032] The buggy address belongs to the variable: [ 9.732183] clk_div_table+0x24/0x440

AI-Powered Analysis

AILast updated: 06/30/2025, 21:54:35 UTC

Technical Analysis

CVE-2022-48803 is a vulnerability identified in the Linux kernel, specifically within the PHY driver for Texas Instruments J721e hardware (phy-j721e-wiz.c). The issue arises from the function _get_table_maxdiv() attempting to access the clk_div_table array out of bounds due to a missing sentinel entry. This results in a global out-of-bounds memory access error, which was detected by the Kernel Address Sanitizer (KASAN). The vulnerability manifests as an out-of-bounds read of 4 bytes at an invalid memory address during the clock divider rate determination process. The bug is triggered during PHY initialization and PCIe PHY setup on affected hardware platforms. The root cause is the absence of a sentinel value in the clk_div_table array, which allows the function to read beyond the array boundary, potentially leading to undefined behavior or kernel crashes. The vulnerability affects Linux kernel versions containing the specific commit 091876cc355d6739e393efa4b3d07f451a6a035c and is related to the Texas Instruments J721e Evaluation Module (EVM) hardware. While no known exploits are reported in the wild, the issue can cause system instability or denial of service due to kernel panics or memory corruption. The vulnerability is primarily a software bug in the Linux kernel PHY driver code that requires patching to add the missing sentinel to the clk_div_table to prevent out-of-bounds access.

Potential Impact

For European organizations, the impact of CVE-2022-48803 depends largely on the deployment of affected hardware platforms running the vulnerable Linux kernel versions, particularly those using Texas Instruments J721e-based systems. Such systems are often embedded or industrial devices, network equipment, or specialized computing platforms. The vulnerability can lead to kernel crashes or denial of service, which may disrupt critical infrastructure, industrial control systems, or network operations. Although there is no evidence of remote code execution or privilege escalation, the instability caused by out-of-bounds memory access can affect system availability and reliability. Organizations relying on embedded Linux devices in telecommunications, manufacturing, or automotive sectors may face operational interruptions. Additionally, the lack of a known exploit reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental crashes. Overall, the threat primarily impacts system availability and integrity, with limited direct confidentiality risks.

Mitigation Recommendations

To mitigate CVE-2022-48803, organizations should: 1) Identify and inventory all Linux systems running on Texas Instruments J721e hardware or similar platforms that utilize the affected PHY driver. 2) Apply the official Linux kernel patches that add the missing sentinel entry to the clk_div_table array in phy-j721e-wiz.c as soon as they become available from trusted sources or Linux kernel maintainers. 3) For embedded or industrial devices where kernel updates are challenging, coordinate with device vendors or system integrators to obtain firmware or software updates addressing this vulnerability. 4) Implement robust monitoring for kernel panics or unusual system crashes that could indicate exploitation attempts or instability related to this vulnerability. 5) Employ network segmentation and access controls to limit exposure of vulnerable devices, reducing the risk of remote triggering of the bug. 6) Maintain regular backups and recovery procedures to minimize operational impact in case of system failures. 7) Engage in proactive vulnerability management to track updates from Linux kernel security advisories and promptly deploy patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-07-16T11:38:08.896Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe6203

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 9:54:35 PM

Last updated: 8/3/2025, 6:47:33 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats