CVE-2022-49471: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: rtw89: cfo: check mac_id to avoid out-of-bounds Somehow, hardware reports incorrect mac_id and pollute memory. Check index before we access the array. UBSAN: array-index-out-of-bounds in rtw89/phy.c:2517:23 index 188 is out of range for type 's32 [64]' CPU: 1 PID: 51550 Comm: irq/35-rtw89_pc Tainted: G OE Call Trace: <IRQ> show_stack+0x52/0x58 dump_stack_lvl+0x4c/0x63 dump_stack+0x10/0x12 ubsan_epilogue+0x9/0x45 __ubsan_handle_out_of_bounds.cold+0x44/0x49 ? __alloc_skb+0x92/0x1d0 rtw89_phy_cfo_parse+0x44/0x7f [rtw89_core] rtw89_core_rx+0x261/0x871 [rtw89_core] ? __alloc_skb+0xee/0x1d0 rtw89_pci_napi_poll+0x3fa/0x4ea [rtw89_pci] __napi_poll+0x33/0x1a0 net_rx_action+0x126/0x260 ? __queue_work+0x217/0x4c0 __do_softirq+0xd9/0x315 ? disable_irq_nosync+0x10/0x10 do_softirq.part.0+0x6d/0x90 </IRQ> <TASK> __local_bh_enable_ip+0x62/0x70 rtw89_pci_interrupt_threadfn+0x182/0x1a6 [rtw89_pci] irq_thread_fn+0x28/0x60 irq_thread+0xc8/0x190 ? irq_thread_fn+0x60/0x60 kthread+0x16b/0x190 ? irq_thread_check_affinity+0xe0/0xe0 ? set_kthread_struct+0x50/0x50 ret_from_fork+0x22/0x30 </TASK>
AI Analysis
Technical Summary
CVE-2022-49471 is a vulnerability identified in the Linux kernel, specifically within the rtw89 wireless driver component. The issue arises from improper bounds checking of the mac_id index used in the rtw89 driver’s CFO (Carrier Frequency Offset) processing function. The vulnerability is caused when hardware reports an incorrect mac_id value, which leads to an out-of-bounds array access in the kernel memory. The affected code attempts to access an array of fixed size (64 elements) using an index that can be as high as 188, resulting in memory corruption. This is detected by the Undefined Behavior Sanitizer (UBSAN) as an array-index-out-of-bounds error in the rtw89/phy.c source file. The stack trace indicates that the fault occurs during interrupt handling and packet processing routines of the rtw89 PCI driver. Since the Linux kernel operates at a privileged level, such out-of-bounds memory access can lead to kernel crashes (denial of service), data corruption, or potentially enable privilege escalation or arbitrary code execution if exploited. However, the vulnerability requires interaction with the affected wireless hardware that reports the incorrect mac_id, which may limit exploitability. There are no known public exploits in the wild at this time, and no CVSS score has been assigned yet. The vulnerability has been publicly disclosed and patched in the Linux kernel source, but specific patch links are not provided in the data. The affected versions correspond to specific Linux kernel commits identified by their hashes.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the vulnerable rtw89 wireless driver, which supports certain Realtek Wi-Fi 6 devices. The impact includes potential system instability or crashes due to kernel panics triggered by out-of-bounds memory access. In environments where wireless connectivity is critical, such as enterprise networks, industrial control systems, or public infrastructure, denial of service could disrupt operations. Furthermore, if an attacker can craft or manipulate hardware or firmware to report malicious mac_id values, there is a theoretical risk of privilege escalation or kernel-level compromise, which would severely impact confidentiality and integrity of data. Organizations relying on Linux-based wireless access points, embedded devices, or laptops with affected Realtek chipsets are at risk. Given the lack of known exploits, the immediate threat is moderate, but the vulnerability should be addressed promptly to prevent future exploitation. The impact is heightened in sectors with high security requirements such as finance, healthcare, and government institutions across Europe.
Mitigation Recommendations
1. Apply the latest Linux kernel updates that include the patch for CVE-2022-49471 as soon as they become available from trusted Linux distributions or the kernel mainline. 2. For organizations using custom or embedded Linux builds, ensure that the rtw89 driver source is updated and rebuilt with the fix. 3. Disable or blacklist the rtw89 driver if the affected wireless hardware is not in use or can be replaced with alternative network adapters. 4. Monitor kernel logs for any signs of out-of-bounds errors or kernel panics related to rtw89 to detect potential exploitation attempts. 5. Implement network segmentation and access controls to limit exposure of vulnerable wireless devices to untrusted networks or users. 6. Engage with hardware vendors to verify firmware integrity and ensure that devices do not report malformed mac_id values. 7. Maintain a robust patch management process to quickly deploy kernel updates across all Linux systems, especially those with wireless capabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2022-49471: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: rtw89: cfo: check mac_id to avoid out-of-bounds Somehow, hardware reports incorrect mac_id and pollute memory. Check index before we access the array. UBSAN: array-index-out-of-bounds in rtw89/phy.c:2517:23 index 188 is out of range for type 's32 [64]' CPU: 1 PID: 51550 Comm: irq/35-rtw89_pc Tainted: G OE Call Trace: <IRQ> show_stack+0x52/0x58 dump_stack_lvl+0x4c/0x63 dump_stack+0x10/0x12 ubsan_epilogue+0x9/0x45 __ubsan_handle_out_of_bounds.cold+0x44/0x49 ? __alloc_skb+0x92/0x1d0 rtw89_phy_cfo_parse+0x44/0x7f [rtw89_core] rtw89_core_rx+0x261/0x871 [rtw89_core] ? __alloc_skb+0xee/0x1d0 rtw89_pci_napi_poll+0x3fa/0x4ea [rtw89_pci] __napi_poll+0x33/0x1a0 net_rx_action+0x126/0x260 ? __queue_work+0x217/0x4c0 __do_softirq+0xd9/0x315 ? disable_irq_nosync+0x10/0x10 do_softirq.part.0+0x6d/0x90 </IRQ> <TASK> __local_bh_enable_ip+0x62/0x70 rtw89_pci_interrupt_threadfn+0x182/0x1a6 [rtw89_pci] irq_thread_fn+0x28/0x60 irq_thread+0xc8/0x190 ? irq_thread_fn+0x60/0x60 kthread+0x16b/0x190 ? irq_thread_check_affinity+0xe0/0xe0 ? set_kthread_struct+0x50/0x50 ret_from_fork+0x22/0x30 </TASK>
AI-Powered Analysis
Technical Analysis
CVE-2022-49471 is a vulnerability identified in the Linux kernel, specifically within the rtw89 wireless driver component. The issue arises from improper bounds checking of the mac_id index used in the rtw89 driver’s CFO (Carrier Frequency Offset) processing function. The vulnerability is caused when hardware reports an incorrect mac_id value, which leads to an out-of-bounds array access in the kernel memory. The affected code attempts to access an array of fixed size (64 elements) using an index that can be as high as 188, resulting in memory corruption. This is detected by the Undefined Behavior Sanitizer (UBSAN) as an array-index-out-of-bounds error in the rtw89/phy.c source file. The stack trace indicates that the fault occurs during interrupt handling and packet processing routines of the rtw89 PCI driver. Since the Linux kernel operates at a privileged level, such out-of-bounds memory access can lead to kernel crashes (denial of service), data corruption, or potentially enable privilege escalation or arbitrary code execution if exploited. However, the vulnerability requires interaction with the affected wireless hardware that reports the incorrect mac_id, which may limit exploitability. There are no known public exploits in the wild at this time, and no CVSS score has been assigned yet. The vulnerability has been publicly disclosed and patched in the Linux kernel source, but specific patch links are not provided in the data. The affected versions correspond to specific Linux kernel commits identified by their hashes.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the vulnerable rtw89 wireless driver, which supports certain Realtek Wi-Fi 6 devices. The impact includes potential system instability or crashes due to kernel panics triggered by out-of-bounds memory access. In environments where wireless connectivity is critical, such as enterprise networks, industrial control systems, or public infrastructure, denial of service could disrupt operations. Furthermore, if an attacker can craft or manipulate hardware or firmware to report malicious mac_id values, there is a theoretical risk of privilege escalation or kernel-level compromise, which would severely impact confidentiality and integrity of data. Organizations relying on Linux-based wireless access points, embedded devices, or laptops with affected Realtek chipsets are at risk. Given the lack of known exploits, the immediate threat is moderate, but the vulnerability should be addressed promptly to prevent future exploitation. The impact is heightened in sectors with high security requirements such as finance, healthcare, and government institutions across Europe.
Mitigation Recommendations
1. Apply the latest Linux kernel updates that include the patch for CVE-2022-49471 as soon as they become available from trusted Linux distributions or the kernel mainline. 2. For organizations using custom or embedded Linux builds, ensure that the rtw89 driver source is updated and rebuilt with the fix. 3. Disable or blacklist the rtw89 driver if the affected wireless hardware is not in use or can be replaced with alternative network adapters. 4. Monitor kernel logs for any signs of out-of-bounds errors or kernel panics related to rtw89 to detect potential exploitation attempts. 5. Implement network segmentation and access controls to limit exposure of vulnerable wireless devices to untrusted networks or users. 6. Engage with hardware vendors to verify firmware integrity and ensure that devices do not report malformed mac_id values. 7. Maintain a robust patch management process to quickly deploy kernel updates across all Linux systems, especially those with wireless capabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.579Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ec4522896dcbe5b43
Added to database: 5/21/2025, 9:09:02 AM
Last enriched: 6/30/2025, 4:10:31 PM
Last updated: 8/10/2025, 3:07:05 PM
Views: 16
Related Threats
CVE-2025-9175: Stack-based Buffer Overflow in neurobin shc
MediumCVE-2025-9174: OS Command Injection in neurobin shc
MediumCVE-2025-9171: Cross Site Scripting in SolidInvoice
MediumCVE-2025-9170: Cross Site Scripting in SolidInvoice
MediumCVE-2025-9169: Cross Site Scripting in SolidInvoice
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.