CVE-2022-49551

7.1 HIGH

📋 TL;DR

This CVE describes an out-of-bounds array access vulnerability in the Linux kernel's USB ISP1760 host controller driver. The vulnerability allows reading beyond array boundaries, potentially leading to information disclosure or system instability. It affects Linux systems using the ISP1760 USB host controller driver.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions with the vulnerable ISP1760 driver code prior to the fix commits
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the ISP1760 USB host controller hardware with the vulnerable driver code.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory corruption leading to system crash, privilege escalation, or information disclosure of kernel memory contents.

🟠

Likely Case

System instability, kernel panic, or information disclosure of adjacent kernel memory.

🟢

If Mitigated

Minimal impact if KASAN or similar memory sanitizers detect and prevent the out-of-bounds access.

🌐 Internet-Facing: LOW - Requires local access to the affected USB controller hardware.
🏢 Internal Only: MEDIUM - Local attackers with physical or privileged access could potentially exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and specific hardware (ISP1760 USB controller). The vulnerability is a read-only out-of-bounds access, limiting potential impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing the fix commits: 26ae2c942b5702f2e43d36b2a4389cfb7d616b6a, 463bddd3ff1acf4036ddb80c34a715eb99debf46, 47d39cb57e8669e507d17d9e0d067d2b3e3a87ae, bf2558bbdce3ab1d6bcba09f354914e4515d0a2b

Vendor Advisory: https://git.kernel.org/stable/c/26ae2c942b5702f2e43d36b2a4389cfb7d616b6a

Restart Required: Yes

Instructions:

1. Update Linux kernel to a version containing the fix commits. 2. Reboot the system to load the patched kernel.

🔧 Temporary Workarounds

Disable ISP1760 USB controller

Linux

Disable the vulnerable USB controller if not required

echo 'blacklist isp1760' >> /etc/modprobe.d/blacklist.conf
rmmod isp1760

🧯 If You Can't Patch

  • Disable the ISP1760 USB controller module if not needed
  • Implement strict access controls to prevent unauthorized local access to affected systems

🔍 How to Verify

Check if Vulnerable:

Check if the ISP1760 driver is loaded: lsmod | grep isp1760. Check kernel version against affected versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits or is newer than the patched versions. Check dmesg for KASAN errors related to isp1760.

📡 Detection & Monitoring

Log Indicators:

  • KASAN error messages mentioning isp1760_register
  • Kernel panic or oops messages related to USB or isp1760

Network Indicators:

  • None - this is a local hardware driver vulnerability

SIEM Query:

Search for kernel logs containing 'KASAN', 'isp1760', or 'out-of-bounds'

🔗 References

📤 Share & Export