Skip to main content

CVE-2022-49563: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49563cvecve-2022-49563
Published: Wed Feb 26 2025 (02/26/2025, 02:23:10 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: qat - add param check for RSA Reject requests with a source buffer that is bigger than the size of the key. This is to prevent a possible integer underflow that might happen when copying the source scatterlist into a linear buffer.

AI-Powered Analysis

AILast updated: 07/04/2025, 06:13:21 UTC

Technical Analysis

CVE-2022-49563 is a vulnerability identified in the Linux kernel's cryptographic acceleration framework, specifically within the QuickAssist Technology (QAT) driver module responsible for RSA operations. The issue arises due to insufficient parameter validation: the driver fails to properly check that the source buffer size does not exceed the size of the RSA key. This flaw can lead to an integer underflow during the process of copying the source scatterlist into a linear buffer. An integer underflow in this context means that the calculation for the buffer size wraps around, potentially causing memory corruption. Such memory corruption can be exploited to cause denial of service (kernel crash) or potentially escalate privileges if an attacker can manipulate kernel memory. The vulnerability is rooted in the crypto qat RSA implementation and was addressed by adding explicit parameter checks to reject requests where the source buffer is larger than the key size. The vulnerability affects specific Linux kernel versions identified by the commit hash a990532023b903b10cf14736241cdd138e4bc92c. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability requires interaction with the kernel crypto subsystem, which is typically accessible to local users or processes with certain privileges, but the exact exploitation vector is not detailed in the provided information.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with the QAT RSA crypto driver enabled. The impact includes potential denial of service through kernel crashes, which can disrupt critical services and infrastructure. More severe exploitation could lead to privilege escalation, compromising system integrity and confidentiality. Organizations relying on Linux servers for web hosting, cloud services, or critical infrastructure may face operational disruptions. Given the widespread use of Linux in European enterprises, government agencies, and telecom providers, exploitation could affect data centers and cloud environments. However, the absence of known exploits and the requirement for interaction with the crypto subsystem somewhat limit immediate risk. Still, the vulnerability could be leveraged by sophisticated attackers or insiders to gain unauthorized access or disrupt services, especially in environments where QAT hardware acceleration is used for cryptographic operations.

Mitigation Recommendations

European organizations should promptly identify Linux systems running affected kernel versions with QAT RSA crypto acceleration enabled. Applying the official Linux kernel patches that add parameter validation is the primary mitigation step. If patching is not immediately feasible, disabling the QAT RSA crypto driver or the QuickAssist hardware acceleration temporarily can reduce exposure. Organizations should audit and restrict access to systems and processes that can interact with the kernel crypto API to trusted users only. Monitoring kernel logs for unusual crashes or errors related to crypto operations can help detect exploitation attempts. Additionally, implementing kernel hardening measures such as Kernel Address Space Layout Randomization (KASLR) and Control Flow Integrity (CFI) can raise the difficulty of exploitation. Regular vulnerability scanning and maintaining an up-to-date asset inventory will aid in managing risk from this and similar kernel vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.591Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aebf96

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:13:21 AM

Last updated: 8/5/2025, 6:52:37 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats