Skip to main content

CVE-2022-48703: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-48703cvecve-2022-48703
Published: Fri May 03 2024 (05/03/2024, 15:14:07 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR In some case, the GDDV returns a package with a buffer which has zero length. It causes that kmemdup() returns ZERO_SIZE_PTR (0x10). Then the data_vault_read() got NULL point dereference problem when accessing the 0x10 value in data_vault. [ 71.024560] BUG: kernel NULL pointer dereference, address: 0000000000000010 This patch uses ZERO_OR_NULL_PTR() for checking ZERO_SIZE_PTR or NULL value in data_vault.

AI-Powered Analysis

AILast updated: 07/04/2025, 06:10:53 UTC

Technical Analysis

CVE-2022-48703 is a vulnerability identified in the Linux kernel's thermal management subsystem, specifically within the int340x_thermal driver. The issue arises when the Generic Dynamic Data Vault (GDDV) returns a package containing a buffer with zero length. In this scenario, the kernel function kmemdup() returns a special pointer value ZERO_SIZE_PTR (0x10) instead of a typical NULL pointer. The vulnerable function data_vault_read() does not properly check for this ZERO_SIZE_PTR value and attempts to dereference it as if it were a valid pointer. This results in a NULL pointer dereference at address 0x10, causing a kernel BUG and likely a system crash (kernel panic). The root cause is the lack of proper validation for zero-length buffers returned by GDDV, leading to unsafe memory access. The patch for this vulnerability involves using the ZERO_OR_NULL_PTR() macro to correctly check for both NULL and ZERO_SIZE_PTR values before dereferencing the pointer, thereby preventing the NULL pointer dereference. This vulnerability affects Linux kernel versions identified by the given commit hashes, and it was publicly disclosed on May 3, 2024. There are no known exploits in the wild at the time of disclosure, and no CVSS score has been assigned yet.

Potential Impact

For European organizations running Linux systems with the affected kernel versions, this vulnerability poses a risk of denial of service (DoS) due to kernel crashes triggered by the NULL pointer dereference. Systems relying on the int340x_thermal driver, which is typically used for thermal management on certain Intel-based platforms, could experience unexpected reboots or downtime. This can disrupt critical services, especially in environments where uptime and reliability are paramount, such as data centers, industrial control systems, and cloud infrastructure. Although this vulnerability does not appear to allow privilege escalation or remote code execution directly, the resulting system instability could be exploited by attackers to cause service interruptions or to facilitate further attacks by forcing system reboots. The absence of known exploits reduces immediate risk, but the vulnerability's presence in the widely deployed Linux kernel means that unpatched systems remain vulnerable to accidental or malicious triggering of the bug.

Mitigation Recommendations

European organizations should promptly identify Linux systems running the affected kernel versions, especially those using Intel platforms with the int340x_thermal driver. Applying the official Linux kernel patch that introduces the ZERO_OR_NULL_PTR() check is the primary mitigation step. If immediate patching is not feasible, organizations should monitor system logs for kernel BUG messages referencing NULL pointer dereferences at address 0x10 and consider temporarily disabling or blacklisting the int340x_thermal driver if it is not critical to system operation. Additionally, implementing kernel crash monitoring and automated reboot prevention mechanisms can help reduce downtime. Organizations should also ensure that their incident response teams are aware of this vulnerability to quickly diagnose and respond to related system crashes. Finally, maintaining up-to-date kernel versions and subscribing to Linux kernel security advisories will help mitigate similar vulnerabilities in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-03T14:55:07.146Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aebf6f

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:10:53 AM

Last updated: 8/8/2025, 12:21:02 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats