Skip to main content

CVE-2022-48972: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-48972cvecve-2022-48972
Published: Mon Oct 21 2024 (10/21/2024, 20:05:53 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() Kernel fault injection test reports null-ptr-deref as follows: BUG: kernel NULL pointer dereference, address: 0000000000000008 RIP: 0010:cfg802154_netdev_notifier_call+0x120/0x310 include/linux/list.h:114 Call Trace: <TASK> raw_notifier_call_chain+0x6d/0xa0 kernel/notifier.c:87 call_netdevice_notifiers_info+0x6e/0xc0 net/core/dev.c:1944 unregister_netdevice_many_notify+0x60d/0xcb0 net/core/dev.c:1982 unregister_netdevice_queue+0x154/0x1a0 net/core/dev.c:10879 register_netdevice+0x9a8/0xb90 net/core/dev.c:10083 ieee802154_if_add+0x6ed/0x7e0 net/mac802154/iface.c:659 ieee802154_register_hw+0x29c/0x330 net/mac802154/main.c:229 mcr20a_probe+0xaaa/0xcb1 drivers/net/ieee802154/mcr20a.c:1316 ieee802154_if_add() allocates wpan_dev as netdev's private data, but not init the list in struct wpan_dev. cfg802154_netdev_notifier_call() manage the list when device register/unregister, and may lead to null-ptr-deref. Use INIT_LIST_HEAD() on it to initialize it correctly.

AI-Powered Analysis

AILast updated: 07/01/2025, 00:41:22 UTC

Technical Analysis

CVE-2022-48972 is a vulnerability in the Linux kernel specifically affecting the mac802154 subsystem, which handles IEEE 802.15.4 wireless networking interfaces. The root cause is a missing initialization of a linked list head in the function ieee802154_if_add(). This function allocates a wpan_dev structure as private data for a network device (netdev) but fails to initialize the list member within this structure using INIT_LIST_HEAD(). Consequently, when the kernel later manages this list during device registration or unregistration via the function cfg802154_netdev_notifier_call(), it may dereference a null pointer, leading to a kernel NULL pointer dereference (null-ptr-deref) and a BUG. This can cause a kernel panic or system crash. The vulnerability was identified through kernel fault injection testing and is triggered during network device notifier callbacks, which are part of the kernel's network device management. The patch involves adding the missing INIT_LIST_HEAD() call to properly initialize the list head in the wpan_dev structure, preventing the null pointer dereference. The affected Linux kernel versions include multiple commits identified by the hash fcf39e6e88e9492f6688ec8ba4e1be622b904232. There are no known exploits in the wild at this time, and no CVSS score has been assigned. The vulnerability impacts the stability and availability of systems running affected Linux kernels with mac802154 support enabled, particularly those using IEEE 802.15.4 wireless interfaces such as low-rate wireless personal area networks (LR-WPANs).

Potential Impact

For European organizations, the primary impact of CVE-2022-48972 is on system availability and reliability. Systems running affected Linux kernels with mac802154 support could experience kernel panics or crashes when network devices are registered or unregistered, potentially causing service disruptions. This is particularly relevant for organizations deploying IoT devices, industrial control systems, or wireless sensor networks that rely on IEEE 802.15.4 protocols, which are used in smart metering, building automation, and other critical infrastructure applications common in Europe. While the vulnerability does not directly expose confidentiality or integrity risks, denial of service through kernel crashes can disrupt operations and lead to downtime. Since exploitation requires interaction with network device registration processes, it may be triggered by local or remote administrative actions or device events. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or malicious triggering of the fault. European organizations with embedded Linux devices or network infrastructure using mac802154 should be aware of this risk to maintain operational continuity.

Mitigation Recommendations

1. Apply the official Linux kernel patches that add the missing INIT_LIST_HEAD() initialization in ieee802154_if_add() as soon as they are available from trusted sources or Linux distributions. 2. For organizations using custom or embedded Linux kernels, ensure kernel source code is updated and rebuilt with the fix included. 3. Disable or remove mac802154 support if IEEE 802.15.4 wireless networking is not required, reducing the attack surface. 4. Monitor system logs for kernel BUG messages or null pointer dereferences related to cfg802154_netdev_notifier_call or ieee802154_if_add to detect potential triggering events. 5. Implement strict access controls on device management interfaces to prevent unauthorized registration or unregistration of network devices that could trigger the vulnerability. 6. Conduct thorough testing of kernel updates in staging environments before deployment to production to avoid unintended disruptions. 7. Maintain up-to-date inventory of devices using mac802154 to prioritize patching and risk assessment. 8. Collaborate with device vendors to ensure embedded systems receive timely kernel updates addressing this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-08-22T01:27:53.629Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982fc4522896dcbe67b2

Added to database: 5/21/2025, 9:09:03 AM

Last enriched: 7/1/2025, 12:41:22 AM

Last updated: 8/7/2025, 10:10:05 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats