CVE-2022-49145: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ACPI: CPPC: Avoid out of bounds access when parsing _CPC data If the NumEntries field in the _CPC return package is less than 2, do not attempt to access the "Revision" element of that package, because it may not be present then. BugLink: https://lore.kernel.org/lkml/20220322143534.GC32582@xsang-OptiPlex-9020/
AI Analysis
Technical Summary
CVE-2022-49145 is a vulnerability identified in the Linux kernel's ACPI (Advanced Configuration and Power Interface) subsystem, specifically within the CPPC (Collaborative Processor Performance Control) component. The issue arises when parsing the _CPC (Collaborative Processor Performance Control) ACPI method's return package. The vulnerability occurs because the kernel code attempts to access the "Revision" element of the _CPC package without verifying that the NumEntries field indicates its presence. If NumEntries is less than 2, the "Revision" element may not exist, leading to an out-of-bounds memory access. This can cause undefined behavior such as kernel crashes or potential memory corruption. The flaw is a logic error in bounds checking during ACPI data parsing, which is critical as ACPI is responsible for hardware configuration and power management. The vulnerability was addressed by adding a check to ensure that if NumEntries is less than 2, the kernel does not attempt to access the "Revision" element, thus preventing out-of-bounds access. This fix mitigates the risk of kernel instability or exploitation through malformed ACPI tables. There are no known exploits in the wild for this vulnerability, and it affects Linux kernel versions identified by the commit hash 337aadff8e4567e39669e07d9a88b789d78458b5 and similar. The vulnerability does not have an assigned CVSS score, and no patch links are provided in the data, but the kernel mailing list reference indicates the fix was committed. This vulnerability is primarily a stability and potential security risk in systems running vulnerable Linux kernels with ACPI CPPC support enabled.
Potential Impact
For European organizations, the impact of CVE-2022-49145 depends largely on their use of Linux-based systems, especially those relying on ACPI CPPC features, such as servers, desktops, and embedded devices. An out-of-bounds access in kernel space can lead to system crashes (denial of service), which could disrupt critical business operations, particularly in sectors like finance, manufacturing, and telecommunications where Linux servers are prevalent. Although no known exploits exist, the vulnerability could be leveraged by a local attacker or malicious software to destabilize systems or potentially escalate privileges if combined with other vulnerabilities. The risk is higher in environments where untrusted or malformed ACPI tables might be introduced, such as virtualized environments or systems with custom firmware. Given the widespread use of Linux in European IT infrastructure, failure to patch this vulnerability could expose organizations to unexpected downtime and potential security breaches, impacting confidentiality, integrity, and availability of systems.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the fix for CVE-2022-49145. Since the vulnerability relates to ACPI CPPC parsing, organizations should: 1) Apply official kernel patches or upgrade to the latest stable kernel releases that address this issue. 2) Audit and verify firmware and ACPI tables on hardware to ensure they conform to specifications and do not contain malformed _CPC data. 3) In virtualized environments, ensure hypervisors and virtual machine firmware do not expose malformed ACPI data to guest systems. 4) Implement kernel hardening measures such as Kernel Address Space Layout Randomization (KASLR) and Kernel Page Table Isolation (KPTI) to reduce exploitation risk. 5) Monitor system logs for ACPI-related errors or kernel oops messages that may indicate attempts to trigger this vulnerability. 6) Restrict local access to trusted users only, as exploitation would likely require local code execution or access to malformed ACPI data. These targeted steps go beyond generic patching by focusing on the ACPI data integrity and system hardening relevant to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2022-49145: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ACPI: CPPC: Avoid out of bounds access when parsing _CPC data If the NumEntries field in the _CPC return package is less than 2, do not attempt to access the "Revision" element of that package, because it may not be present then. BugLink: https://lore.kernel.org/lkml/20220322143534.GC32582@xsang-OptiPlex-9020/
AI-Powered Analysis
Technical Analysis
CVE-2022-49145 is a vulnerability identified in the Linux kernel's ACPI (Advanced Configuration and Power Interface) subsystem, specifically within the CPPC (Collaborative Processor Performance Control) component. The issue arises when parsing the _CPC (Collaborative Processor Performance Control) ACPI method's return package. The vulnerability occurs because the kernel code attempts to access the "Revision" element of the _CPC package without verifying that the NumEntries field indicates its presence. If NumEntries is less than 2, the "Revision" element may not exist, leading to an out-of-bounds memory access. This can cause undefined behavior such as kernel crashes or potential memory corruption. The flaw is a logic error in bounds checking during ACPI data parsing, which is critical as ACPI is responsible for hardware configuration and power management. The vulnerability was addressed by adding a check to ensure that if NumEntries is less than 2, the kernel does not attempt to access the "Revision" element, thus preventing out-of-bounds access. This fix mitigates the risk of kernel instability or exploitation through malformed ACPI tables. There are no known exploits in the wild for this vulnerability, and it affects Linux kernel versions identified by the commit hash 337aadff8e4567e39669e07d9a88b789d78458b5 and similar. The vulnerability does not have an assigned CVSS score, and no patch links are provided in the data, but the kernel mailing list reference indicates the fix was committed. This vulnerability is primarily a stability and potential security risk in systems running vulnerable Linux kernels with ACPI CPPC support enabled.
Potential Impact
For European organizations, the impact of CVE-2022-49145 depends largely on their use of Linux-based systems, especially those relying on ACPI CPPC features, such as servers, desktops, and embedded devices. An out-of-bounds access in kernel space can lead to system crashes (denial of service), which could disrupt critical business operations, particularly in sectors like finance, manufacturing, and telecommunications where Linux servers are prevalent. Although no known exploits exist, the vulnerability could be leveraged by a local attacker or malicious software to destabilize systems or potentially escalate privileges if combined with other vulnerabilities. The risk is higher in environments where untrusted or malformed ACPI tables might be introduced, such as virtualized environments or systems with custom firmware. Given the widespread use of Linux in European IT infrastructure, failure to patch this vulnerability could expose organizations to unexpected downtime and potential security breaches, impacting confidentiality, integrity, and availability of systems.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the fix for CVE-2022-49145. Since the vulnerability relates to ACPI CPPC parsing, organizations should: 1) Apply official kernel patches or upgrade to the latest stable kernel releases that address this issue. 2) Audit and verify firmware and ACPI tables on hardware to ensure they conform to specifications and do not contain malformed _CPC data. 3) In virtualized environments, ensure hypervisors and virtual machine firmware do not expose malformed ACPI data to guest systems. 4) Implement kernel hardening measures such as Kernel Address Space Layout Randomization (KASLR) and Kernel Page Table Isolation (KPTI) to reduce exploitation risk. 5) Monitor system logs for ACPI-related errors or kernel oops messages that may indicate attempts to trigger this vulnerability. 6) Restrict local access to trusted users only, as exploitation would likely require local code execution or access to malformed ACPI data. These targeted steps go beyond generic patching by focusing on the ACPI data integrity and system hardening relevant to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T01:49:39.270Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe5032
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 3:25:26 AM
Last updated: 8/3/2025, 6:49:46 AM
Views: 18
Related Threats
CVE-2025-9099: Unrestricted Upload in Acrel Environmental Monitoring Cloud Platform
MediumCVE-2025-9098: Improper Export of Android Application Components in Elseplus File Recovery App
MediumCVE-2025-31715: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
CriticalCVE-2025-31714: CWE-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
MediumCVE-2025-31713: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.