Skip to main content

CVE-2022-49524: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49524cvecve-2022-49524
Published: Wed Feb 26 2025 (02/26/2025, 02:13:48 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: media: pci: cx23885: Fix the error handling in cx23885_initdev() When the driver fails to call the dma_set_mask(), the driver will get the following splat: [ 55.853884] BUG: KASAN: use-after-free in __process_removed_driver+0x3c/0x240 [ 55.854486] Read of size 8 at addr ffff88810de60408 by task modprobe/590 [ 55.856822] Call Trace: [ 55.860327] __process_removed_driver+0x3c/0x240 [ 55.861347] bus_for_each_dev+0x102/0x160 [ 55.861681] i2c_del_driver+0x2f/0x50 This is because the driver has initialized the i2c related resources in cx23885_dev_setup() but not released them in error handling, fix this bug by modifying the error path that jumps after failing to call the dma_set_mask().

AI-Powered Analysis

AILast updated: 07/03/2025, 01:58:37 UTC

Technical Analysis

CVE-2022-49524 is a high-severity vulnerability identified in the Linux kernel, specifically within the PCI media driver for the cx23885 device. The issue arises from improper error handling in the cx23885_initdev() function. When the driver fails to successfully call dma_set_mask(), it does not correctly release previously initialized I2C-related resources in the error path. This leads to a use-after-free condition detected by Kernel Address Sanitizer (KASAN), causing a kernel crash (BUG) during driver removal operations. The vulnerability is classified under CWE-416 (Use After Free), indicating that memory is accessed after it has been freed, which can lead to undefined behavior including system crashes or potential arbitrary code execution. The CVSS 3.1 score is 7.8 (high), reflecting that the vulnerability requires local privileges (AV:L), low attack complexity (AC:L), and privileges (PR:L) but no user interaction (UI:N). The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), meaning exploitation could allow an attacker with limited privileges to execute code in kernel context, potentially leading to full system compromise. The affected versions correspond to specific Linux kernel commits identified by the hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and patched in the Linux kernel source. The root cause is the failure to properly unwind and free resources during error handling in device initialization, which is a critical flaw in kernel driver robustness.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to those running Linux-based systems with the cx23885 PCI media driver enabled. This includes servers, embedded systems, and workstations that utilize this hardware for media capture or processing. Successful exploitation could allow a local attacker or malicious process to escalate privileges to kernel level, compromising system confidentiality, integrity, and availability. This could lead to data breaches, disruption of services, or persistent malware infections. Given the widespread use of Linux in enterprise environments, including cloud infrastructure and critical industrial systems across Europe, the impact could be substantial if exploited. Organizations relying on Linux kernels with this driver should consider the vulnerability a priority for patching to prevent potential kernel panics or privilege escalations that could disrupt business operations or critical infrastructure.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Apply the latest Linux kernel patches that address CVE-2022-49524 as soon as possible, ensuring the error handling in cx23885_initdev() is corrected. 2) Audit systems to identify the presence of the cx23885 driver and assess exposure, especially on systems with PCI media capture hardware. 3) Restrict local access to trusted users only, as exploitation requires local privileges. 4) Employ kernel hardening techniques such as Kernel Address Sanitizer (KASAN) in testing environments to detect similar issues proactively. 5) Monitor kernel logs for signs of use-after-free or related kernel BUG messages that may indicate attempted exploitation or instability. 6) For environments where patching is delayed, consider disabling or blacklisting the cx23885 driver if not required, to reduce attack surface. 7) Incorporate this vulnerability into vulnerability management and incident response plans to ensure rapid detection and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.588Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe432a

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 7/3/2025, 1:58:37 AM

Last updated: 8/5/2025, 8:43:02 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats