Skip to main content

CVE-2022-49471: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49471cvecve-2022-49471
Published: Wed Feb 26 2025 (02/26/2025, 02:13:14 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: rtw89: cfo: check mac_id to avoid out-of-bounds Somehow, hardware reports incorrect mac_id and pollute memory. Check index before we access the array. UBSAN: array-index-out-of-bounds in rtw89/phy.c:2517:23 index 188 is out of range for type 's32 [64]' CPU: 1 PID: 51550 Comm: irq/35-rtw89_pc Tainted: G OE Call Trace: <IRQ> show_stack+0x52/0x58 dump_stack_lvl+0x4c/0x63 dump_stack+0x10/0x12 ubsan_epilogue+0x9/0x45 __ubsan_handle_out_of_bounds.cold+0x44/0x49 ? __alloc_skb+0x92/0x1d0 rtw89_phy_cfo_parse+0x44/0x7f [rtw89_core] rtw89_core_rx+0x261/0x871 [rtw89_core] ? __alloc_skb+0xee/0x1d0 rtw89_pci_napi_poll+0x3fa/0x4ea [rtw89_pci] __napi_poll+0x33/0x1a0 net_rx_action+0x126/0x260 ? __queue_work+0x217/0x4c0 __do_softirq+0xd9/0x315 ? disable_irq_nosync+0x10/0x10 do_softirq.part.0+0x6d/0x90 </IRQ> <TASK> __local_bh_enable_ip+0x62/0x70 rtw89_pci_interrupt_threadfn+0x182/0x1a6 [rtw89_pci] irq_thread_fn+0x28/0x60 irq_thread+0xc8/0x190 ? irq_thread_fn+0x60/0x60 kthread+0x16b/0x190 ? irq_thread_check_affinity+0xe0/0xe0 ? set_kthread_struct+0x50/0x50 ret_from_fork+0x22/0x30 </TASK>

AI-Powered Analysis

AILast updated: 06/30/2025, 16:10:31 UTC

Technical Analysis

CVE-2022-49471 is a vulnerability identified in the Linux kernel, specifically within the rtw89 wireless driver component. The issue arises from improper bounds checking of the mac_id index used in the rtw89 driver’s CFO (Carrier Frequency Offset) processing function. The vulnerability is caused when hardware reports an incorrect mac_id value, which leads to an out-of-bounds array access in the kernel memory. The affected code attempts to access an array of fixed size (64 elements) using an index that can be as high as 188, resulting in memory corruption. This is detected by the Undefined Behavior Sanitizer (UBSAN) as an array-index-out-of-bounds error in the rtw89/phy.c source file. The stack trace indicates that the fault occurs during interrupt handling and packet processing routines of the rtw89 PCI driver. Since the Linux kernel operates at a privileged level, such out-of-bounds memory access can lead to kernel crashes (denial of service), data corruption, or potentially enable privilege escalation or arbitrary code execution if exploited. However, the vulnerability requires interaction with the affected wireless hardware that reports the incorrect mac_id, which may limit exploitability. There are no known public exploits in the wild at this time, and no CVSS score has been assigned yet. The vulnerability has been publicly disclosed and patched in the Linux kernel source, but specific patch links are not provided in the data. The affected versions correspond to specific Linux kernel commits identified by their hashes.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the vulnerable rtw89 wireless driver, which supports certain Realtek Wi-Fi 6 devices. The impact includes potential system instability or crashes due to kernel panics triggered by out-of-bounds memory access. In environments where wireless connectivity is critical, such as enterprise networks, industrial control systems, or public infrastructure, denial of service could disrupt operations. Furthermore, if an attacker can craft or manipulate hardware or firmware to report malicious mac_id values, there is a theoretical risk of privilege escalation or kernel-level compromise, which would severely impact confidentiality and integrity of data. Organizations relying on Linux-based wireless access points, embedded devices, or laptops with affected Realtek chipsets are at risk. Given the lack of known exploits, the immediate threat is moderate, but the vulnerability should be addressed promptly to prevent future exploitation. The impact is heightened in sectors with high security requirements such as finance, healthcare, and government institutions across Europe.

Mitigation Recommendations

1. Apply the latest Linux kernel updates that include the patch for CVE-2022-49471 as soon as they become available from trusted Linux distributions or the kernel mainline. 2. For organizations using custom or embedded Linux builds, ensure that the rtw89 driver source is updated and rebuilt with the fix. 3. Disable or blacklist the rtw89 driver if the affected wireless hardware is not in use or can be replaced with alternative network adapters. 4. Monitor kernel logs for any signs of out-of-bounds errors or kernel panics related to rtw89 to detect potential exploitation attempts. 5. Implement network segmentation and access controls to limit exposure of vulnerable wireless devices to untrusted networks or users. 6. Engage with hardware vendors to verify firmware integrity and ensure that devices do not report malformed mac_id values. 7. Maintain a robust patch management process to quickly deploy kernel updates across all Linux systems, especially those with wireless capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.579Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe5b43

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 4:10:31 PM

Last updated: 8/10/2025, 3:07:05 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats