7.8
HIGH
CVE-2022-49478
Pvrusb2 Array Index Out-of-Bounds Vulnerability
Description

In the Linux kernel, the following vulnerability has been resolved: media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init Syzbot reported that -1 is used as array index. The problem was in missing validation check. hdw->unit_number is initialized with -1 and then if init table walk fails this value remains unchanged. Since code blindly uses this member for array indexing adding sanity check is the easiest fix for that. hdw->workpoll initialization moved upper to prevent warning in __flush_work.

INFO

Published Date :

Feb. 26, 2025, 7:01 a.m.

Last Modified :

March 17, 2025, 4:07 p.m.

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

1.8
Affected Products

The following products are affected by CVE-2022-49478 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-49478 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-49478 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Mar. 17, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Added CWE CWE-129
    Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.198 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.121 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.46 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 5.17.14 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.18 up to (excluding) 5.18.3 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.10 up to (excluding) 4.14.283 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 2.6.18 up to (excluding) 4.9.318 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.15 up to (excluding) 4.19.247
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/1310fc3538dcc375a2f46ef0a438512c2ca32827 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/24e807541e4a9263ed928e6ae3498de3ad43bd1e Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/2e004fe914b243db41fa96f9e583385f360ea58e Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/3309c2c574e13b21b44729f5bdbf21f60189b79a Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/4351bfe36aba9fa7dc9d68d498d25d41a0f45e67 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/471bec68457aaf981add77b4f590d65dd7da1059 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/a3304766d9384886e6d3092c776273526947a2e9 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/a3660e06675bccec4bf149c7229ea1d491ba10d7 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/f99a8b1ec0eddc2931aeaa4f490277a15b39f511 Types: Patch
  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Feb. 26, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init Syzbot reported that -1 is used as array index. The problem was in missing validation check. hdw->unit_number is initialized with -1 and then if init table walk fails this value remains unchanged. Since code blindly uses this member for array indexing adding sanity check is the easiest fix for that. hdw->workpoll initialization moved upper to prevent warning in __flush_work.
    Added Reference https://git.kernel.org/stable/c/1310fc3538dcc375a2f46ef0a438512c2ca32827
    Added Reference https://git.kernel.org/stable/c/24e807541e4a9263ed928e6ae3498de3ad43bd1e
    Added Reference https://git.kernel.org/stable/c/2e004fe914b243db41fa96f9e583385f360ea58e
    Added Reference https://git.kernel.org/stable/c/3309c2c574e13b21b44729f5bdbf21f60189b79a
    Added Reference https://git.kernel.org/stable/c/4351bfe36aba9fa7dc9d68d498d25d41a0f45e67
    Added Reference https://git.kernel.org/stable/c/471bec68457aaf981add77b4f590d65dd7da1059
    Added Reference https://git.kernel.org/stable/c/a3304766d9384886e6d3092c776273526947a2e9
    Added Reference https://git.kernel.org/stable/c/a3660e06675bccec4bf149c7229ea1d491ba10d7
    Added Reference https://git.kernel.org/stable/c/f99a8b1ec0eddc2931aeaa4f490277a15b39f511
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-49478 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-49478 weaknesses.

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
© cvefeed.io
Latest DB Update: Apr. 24, 2025 1:14