Skip to main content

CVE-2022-49612: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49612cvecve-2022-49612
Published: Wed Feb 26 2025 (02/26/2025, 02:23:34 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: power: supply: core: Fix boundary conditions in interpolation The functions power_supply_temp2resist_simple and power_supply_ocv2cap_simple handle boundary conditions incorrectly. The change was introduced in a4585ba2050f460f749bbaf2b67bd56c41e30283 ("power: supply: core: Use library interpolation"). There are two issues: First, the lines "high = i - 1" and "high = i" in ocv2cap have the wrong order compared to temp2resist. As a consequence, ocv2cap sets high=-1 if ocv>table[0].ocv, which causes an out-of-bounds read. Second, the logic of temp2resist is also not correct. Consider the case table[] = {{20, 100}, {10, 80}, {0, 60}}. For temp=5, we expect a resistance of 70% by interpolation. However, temp2resist sets high=low=2 and returns 60.

AI-Powered Analysis

AILast updated: 06/29/2025, 23:12:33 UTC

Technical Analysis

CVE-2022-49612 is a vulnerability identified in the Linux kernel's power supply core module, specifically affecting the interpolation functions power_supply_temp2resist_simple and power_supply_ocv2cap_simple. These functions are responsible for converting temperature and open-circuit voltage (OCV) readings into resistance and capacity values, respectively, using interpolation against predefined tables. The vulnerability arises from incorrect handling of boundary conditions in these interpolation routines. In the ocv2cap function, the ordering of index assignments is flawed, causing the variable 'high' to be set to -1 when the OCV value exceeds the highest table entry, leading to an out-of-bounds read. Similarly, the temp2resist function incorrectly sets interpolation indices, resulting in inaccurate resistance calculations. For example, given a temperature input of 5 with a table of {{20,100}, {10,80}, {0,60}}, the expected interpolated resistance is 70%, but the function returns 60% due to improper index handling. Although this vulnerability does not directly lead to code execution or privilege escalation, the out-of-bounds read can cause kernel memory disclosure or instability, potentially leading to denial of service (system crashes). The issue was introduced in a specific commit (a4585ba2050f460f749bbaf2b67bd56c41e30283) that switched to a library interpolation method. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2022-49612 is primarily related to system stability and potential information disclosure within Linux-based environments. Since Linux is widely used in servers, embedded systems, and IoT devices across Europe, especially in critical infrastructure, telecommunications, and industrial control systems, any kernel instability can disrupt operations. The out-of-bounds read could allow attackers with local access to glean sensitive kernel memory information, which might aid in further attacks. Although remote exploitation is unlikely without prior access, insider threats or compromised accounts could leverage this vulnerability to cause denial of service or gather sensitive data. This could affect sectors such as finance, healthcare, manufacturing, and government services that rely heavily on Linux servers and embedded devices. Given the kernel-level nature, the vulnerability could also impact cloud service providers and data centers operating in Europe, potentially affecting multiple tenants if exploited.

Mitigation Recommendations

To mitigate CVE-2022-49612, European organizations should prioritize applying the official Linux kernel patches that correct the boundary condition handling in the power supply interpolation functions. Since the vulnerability stems from a specific commit, reverting or updating to a kernel version that includes the fix is essential. Organizations using custom or embedded Linux distributions should ensure their maintainers backport the fix promptly. Additionally, restricting local access to trusted users and employing strict privilege separation can reduce exploitation risk. Monitoring kernel logs for unusual crashes or memory errors related to power supply modules can help detect exploitation attempts. For critical systems, consider implementing kernel live patching solutions to apply fixes without downtime. Finally, conduct thorough testing of power management components after patching to ensure system stability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:21:30.418Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe45fd

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 6/29/2025, 11:12:33 PM

Last updated: 8/14/2025, 3:49:09 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats