Skip to main content

CVE-2022-49551: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49551cvecve-2022-49551
Published: Wed Feb 26 2025 (02/26/2025, 02:14:01 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: usb: isp1760: Fix out-of-bounds array access Running the driver through kasan gives an interesting splat: BUG: KASAN: global-out-of-bounds in isp1760_register+0x180/0x70c Read of size 20 at addr f1db2e64 by task swapper/0/1 (...) isp1760_register from isp1760_plat_probe+0x1d8/0x220 (...) This happens because the loop reading the regmap fields for the different ISP1760 variants look like this: for (i = 0; i < HC_FIELD_MAX; i++) { ... } Meaning it expects the arrays to be at least HC_FIELD_MAX - 1 long. However the arrays isp1760_hc_reg_fields[], isp1763_hc_reg_fields[], isp1763_hc_volatile_ranges[] and isp1763_dc_volatile_ranges[] are dynamically sized during compilation. Fix this by putting an empty assignment to the [HC_FIELD_MAX] and [DC_FIELD_MAX] array member at the end of each array. This will make the array one member longer than it needs to be, but avoids the risk of overwriting whatever is inside [HC_FIELD_MAX - 1] and is simple and intuitive to read. Also add comments explaining what is going on.

AI-Powered Analysis

AILast updated: 06/29/2025, 22:24:42 UTC

Technical Analysis

CVE-2022-49551 is a vulnerability identified in the Linux kernel's USB driver for the ISP1760 USB host controller. The issue arises from an out-of-bounds array access during the initialization of the ISP1760 driver. Specifically, the vulnerability occurs in the isp1760_register function, where a loop iterates over an array of register map fields expecting the array length to be at least HC_FIELD_MAX. However, the arrays isp1760_hc_reg_fields[], isp1763_hc_reg_fields[], isp1763_hc_volatile_ranges[], and isp1763_dc_volatile_ranges[] are dynamically sized during compilation and may not meet this length expectation. This mismatch leads to a global out-of-bounds read, as detected by Kernel Address Sanitizer (KASAN), potentially causing the kernel to read memory beyond the intended array bounds. The root cause is a missing array element assignment at the HC_FIELD_MAX and DC_FIELD_MAX indices, which was fixed by adding an empty assignment to extend the arrays by one member, preventing overwriting adjacent memory. This vulnerability could lead to kernel instability or crashes (denial of service) and may be leveraged in more complex attacks if combined with other vulnerabilities. No known exploits are reported in the wild, and the issue was addressed by the Linux kernel maintainers through a patch that ensures safe array access and adds clarifying comments for maintainability.

Potential Impact

For European organizations, this vulnerability primarily threatens systems running Linux kernels with the affected ISP1760 USB host controller driver versions. The impact includes potential kernel crashes or system instability due to out-of-bounds memory access, which can lead to denial of service conditions. While the vulnerability itself does not directly enable privilege escalation or remote code execution, exploitation could disrupt critical services, especially in environments relying on USB-connected devices managed by the ISP1760 driver. Industries with high dependence on Linux-based embedded systems, industrial control systems, or specialized hardware using this USB controller may face operational disruptions. Additionally, organizations with stringent uptime requirements, such as financial institutions, healthcare providers, and critical infrastructure operators, could experience significant operational and reputational damage if systems become unstable. Given the lack of known exploits, the immediate risk is moderate, but the vulnerability should be addressed promptly to prevent potential future exploitation, especially in sensitive or high-availability environments.

Mitigation Recommendations

European organizations should apply the official Linux kernel patches that address CVE-2022-49551 as soon as they become available in their distribution's kernel updates. Specifically, updating to a kernel version that includes the fix for the ISP1760 driver array bounds issue is critical. For environments where immediate patching is not feasible, organizations should audit the use of ISP1760 USB host controllers and consider disabling or isolating affected hardware where possible to reduce exposure. Employ kernel hardening techniques such as Kernel Address Sanitizer (KASAN) in testing environments to detect similar issues proactively. Additionally, organizations should monitor kernel mailing lists and security advisories for any emerging exploit developments related to this vulnerability. Implementing strict access controls and minimizing unnecessary USB device usage can further reduce the attack surface. Finally, maintaining comprehensive system backups and robust incident response plans will help mitigate the impact of any potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.590Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe4414

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 10:24:42 PM

Last updated: 8/5/2025, 12:36:42 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats