CVE-2022-49478

In the Linux kernel, the following vulnerability has been resolved: media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init Syzbot reported that -1 is used as array index. The problem was in missing validation check. hdw->unit_number is initialized with -1 and then if init table walk fails this value remains unchanged. Since code blindly uses this member for array indexing adding sanity check is the easiest fix for that. hdw->workpoll initialization moved upper to prevent warning in __flush_work.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Mar 2025, 16:07

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: pvrusb2: arreglo array-index-out-of-bounds en pvr2_i2c_core_init Syzbot informó que se usa -1 como índice de matriz. El problema estaba en la falta de verificación de validación. hdw->unit_number se inicializa con -1 y luego, si falla el recorrido de tabla init, este valor permanece sin cambios. Dado que el código usa ciegamente este miembro para la indexación de matrices, agregar una verificación de cordura es la solución más fácil para eso. La inicialización de hdw->workpoll se movió hacia arriba para evitar la advertencia en __flush_work.
CWE CWE-129
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/1310fc3538dcc375a2f46ef0a438512c2ca32827 - () https://git.kernel.org/stable/c/1310fc3538dcc375a2f46ef0a438512c2ca32827 - Patch
References () https://git.kernel.org/stable/c/24e807541e4a9263ed928e6ae3498de3ad43bd1e - () https://git.kernel.org/stable/c/24e807541e4a9263ed928e6ae3498de3ad43bd1e - Patch
References () https://git.kernel.org/stable/c/2e004fe914b243db41fa96f9e583385f360ea58e - () https://git.kernel.org/stable/c/2e004fe914b243db41fa96f9e583385f360ea58e - Patch
References () https://git.kernel.org/stable/c/3309c2c574e13b21b44729f5bdbf21f60189b79a - () https://git.kernel.org/stable/c/3309c2c574e13b21b44729f5bdbf21f60189b79a - Patch
References () https://git.kernel.org/stable/c/4351bfe36aba9fa7dc9d68d498d25d41a0f45e67 - () https://git.kernel.org/stable/c/4351bfe36aba9fa7dc9d68d498d25d41a0f45e67 - Patch
References () https://git.kernel.org/stable/c/471bec68457aaf981add77b4f590d65dd7da1059 - () https://git.kernel.org/stable/c/471bec68457aaf981add77b4f590d65dd7da1059 - Patch
References () https://git.kernel.org/stable/c/a3304766d9384886e6d3092c776273526947a2e9 - () https://git.kernel.org/stable/c/a3304766d9384886e6d3092c776273526947a2e9 - Patch
References () https://git.kernel.org/stable/c/a3660e06675bccec4bf149c7229ea1d491ba10d7 - () https://git.kernel.org/stable/c/a3660e06675bccec4bf149c7229ea1d491ba10d7 - Patch
References () https://git.kernel.org/stable/c/f99a8b1ec0eddc2931aeaa4f490277a15b39f511 - () https://git.kernel.org/stable/c/f99a8b1ec0eddc2931aeaa4f490277a15b39f511 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-17 16:07


NVD link : CVE-2022-49478

Mitre link : CVE-2022-49478

CVE.ORG link : CVE-2022-49478


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-129

Improper Validation of Array Index