CVE-2022-48952: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: PCI: mt7621: Add sentinel to quirks table Current driver is missing a sentinel in the struct soc_device_attribute array, which causes an oops when assessed by the soc_device_match(mt7621_pcie_quirks_match) call. This was only exposed once the CONFIG_SOC_MT7621 mt7621 soc_dev_attr was fixed to register the SOC as a device, in: commit 7c18b64bba3b ("mips: ralink: mt7621: do not use kzalloc too early") Fix it by adding the required sentinel.
AI Analysis
Technical Summary
CVE-2022-48952 is a vulnerability identified in the Linux kernel specifically related to the PCI driver for the MediaTek MT7621 System on Chip (SoC). The issue arises from the absence of a sentinel value in the soc_device_attribute array within the mt7621 PCI quirks driver. This sentinel is necessary to properly terminate the array that is used by the soc_device_match function during device matching operations. Without this sentinel, the kernel attempts to access beyond the intended array bounds, leading to a kernel oops (a type of kernel crash). This vulnerability was introduced or became exposed after a prior fix (commit 7c18b64bba3b) that corrected the registration of the MT7621 SoC as a device, which changed how the soc_device_match function processes the quirks table. The root cause is a missing sentinel in the quirks table array, which is a programming oversight in the driver code. The impact of this flaw is primarily a denial-of-service condition caused by a kernel crash when the affected driver code is executed. There is no indication that this vulnerability allows for privilege escalation, arbitrary code execution, or data leakage. The vulnerability affects specific Linux kernel versions containing the affected driver code and the MT7621 SoC platform. No known exploits are currently reported in the wild, and no CVSS score has been assigned to this vulnerability yet. The fix involves adding the required sentinel value to the quirks table array to prevent out-of-bounds access and subsequent kernel oops.
Potential Impact
For European organizations, the primary impact of CVE-2022-48952 is the potential for denial-of-service (DoS) on systems running Linux kernels with the affected MT7621 PCI driver. The MT7621 SoC is commonly used in embedded devices such as routers, gateways, and network appliances. Organizations relying on such devices with Linux-based firmware that includes this vulnerable driver could experience unexpected system crashes, leading to network outages or degraded service availability. This could affect critical infrastructure components, especially in sectors like telecommunications, industrial control systems, and enterprise networking where embedded Linux devices are prevalent. However, since the vulnerability does not appear to allow code execution or privilege escalation, the risk of data breaches or system compromise is low. The absence of known exploits in the wild reduces immediate threat levels but does not eliminate the risk of future exploitation attempts. Organizations using custom or vendor-provided Linux distributions on MT7621-based hardware should assess their exposure and prioritize patching to maintain operational stability and avoid service disruptions.
Mitigation Recommendations
1. Identify all devices and systems within the organization that use the MediaTek MT7621 SoC running Linux kernels with the affected driver versions. This includes embedded routers, network appliances, and IoT devices. 2. Apply the official Linux kernel patches that add the missing sentinel to the mt7621 PCI quirks table as soon as they become available from trusted sources or vendor firmware updates. 3. For devices where kernel patching is not immediately feasible, consider temporary network segmentation or isolation to limit exposure and reduce the risk of triggering the vulnerability. 4. Monitor system logs and kernel messages for signs of kernel oops or crashes related to the mt7621_pcie_quirks_match function. 5. Engage with device vendors to obtain updated firmware versions that incorporate the fix. 6. Implement robust device inventory and configuration management to track embedded Linux devices and their kernel versions. 7. Conduct regular vulnerability assessments and penetration tests focusing on embedded device firmware to detect similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2022-48952: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: PCI: mt7621: Add sentinel to quirks table Current driver is missing a sentinel in the struct soc_device_attribute array, which causes an oops when assessed by the soc_device_match(mt7621_pcie_quirks_match) call. This was only exposed once the CONFIG_SOC_MT7621 mt7621 soc_dev_attr was fixed to register the SOC as a device, in: commit 7c18b64bba3b ("mips: ralink: mt7621: do not use kzalloc too early") Fix it by adding the required sentinel.
AI-Powered Analysis
Technical Analysis
CVE-2022-48952 is a vulnerability identified in the Linux kernel specifically related to the PCI driver for the MediaTek MT7621 System on Chip (SoC). The issue arises from the absence of a sentinel value in the soc_device_attribute array within the mt7621 PCI quirks driver. This sentinel is necessary to properly terminate the array that is used by the soc_device_match function during device matching operations. Without this sentinel, the kernel attempts to access beyond the intended array bounds, leading to a kernel oops (a type of kernel crash). This vulnerability was introduced or became exposed after a prior fix (commit 7c18b64bba3b) that corrected the registration of the MT7621 SoC as a device, which changed how the soc_device_match function processes the quirks table. The root cause is a missing sentinel in the quirks table array, which is a programming oversight in the driver code. The impact of this flaw is primarily a denial-of-service condition caused by a kernel crash when the affected driver code is executed. There is no indication that this vulnerability allows for privilege escalation, arbitrary code execution, or data leakage. The vulnerability affects specific Linux kernel versions containing the affected driver code and the MT7621 SoC platform. No known exploits are currently reported in the wild, and no CVSS score has been assigned to this vulnerability yet. The fix involves adding the required sentinel value to the quirks table array to prevent out-of-bounds access and subsequent kernel oops.
Potential Impact
For European organizations, the primary impact of CVE-2022-48952 is the potential for denial-of-service (DoS) on systems running Linux kernels with the affected MT7621 PCI driver. The MT7621 SoC is commonly used in embedded devices such as routers, gateways, and network appliances. Organizations relying on such devices with Linux-based firmware that includes this vulnerable driver could experience unexpected system crashes, leading to network outages or degraded service availability. This could affect critical infrastructure components, especially in sectors like telecommunications, industrial control systems, and enterprise networking where embedded Linux devices are prevalent. However, since the vulnerability does not appear to allow code execution or privilege escalation, the risk of data breaches or system compromise is low. The absence of known exploits in the wild reduces immediate threat levels but does not eliminate the risk of future exploitation attempts. Organizations using custom or vendor-provided Linux distributions on MT7621-based hardware should assess their exposure and prioritize patching to maintain operational stability and avoid service disruptions.
Mitigation Recommendations
1. Identify all devices and systems within the organization that use the MediaTek MT7621 SoC running Linux kernels with the affected driver versions. This includes embedded routers, network appliances, and IoT devices. 2. Apply the official Linux kernel patches that add the missing sentinel to the mt7621 PCI quirks table as soon as they become available from trusted sources or vendor firmware updates. 3. For devices where kernel patching is not immediately feasible, consider temporary network segmentation or isolation to limit exposure and reduce the risk of triggering the vulnerability. 4. Monitor system logs and kernel messages for signs of kernel oops or crashes related to the mt7621_pcie_quirks_match function. 5. Engage with device vendors to obtain updated firmware versions that incorporate the fix. 6. Implement robust device inventory and configuration management to track embedded Linux devices and their kernel versions. 7. Conduct regular vulnerability assessments and penetration tests focusing on embedded device firmware to detect similar issues proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-08-22T01:27:53.626Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9820c4522896dcbdd589
Added to database: 5/21/2025, 9:08:48 AM
Last enriched: 6/28/2025, 12:11:38 AM
Last updated: 8/18/2025, 8:39:40 AM
Views: 31
Related Threats
CVE-2025-41452: CWE-15: External Control of System or Configuration Setting in Danfoss AK-SM8xxA Series
MediumCVE-2025-41451: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Danfoss AK-SM8xxA Series
HighCVE-2025-43752: CWE-770 Allocation of Resources Without Limits or Throttling in Liferay Portal
MediumCVE-2025-43753: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
LowCVE-2025-51606: n/a
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.