CVE-2022-48972: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() Kernel fault injection test reports null-ptr-deref as follows: BUG: kernel NULL pointer dereference, address: 0000000000000008 RIP: 0010:cfg802154_netdev_notifier_call+0x120/0x310 include/linux/list.h:114 Call Trace: <TASK> raw_notifier_call_chain+0x6d/0xa0 kernel/notifier.c:87 call_netdevice_notifiers_info+0x6e/0xc0 net/core/dev.c:1944 unregister_netdevice_many_notify+0x60d/0xcb0 net/core/dev.c:1982 unregister_netdevice_queue+0x154/0x1a0 net/core/dev.c:10879 register_netdevice+0x9a8/0xb90 net/core/dev.c:10083 ieee802154_if_add+0x6ed/0x7e0 net/mac802154/iface.c:659 ieee802154_register_hw+0x29c/0x330 net/mac802154/main.c:229 mcr20a_probe+0xaaa/0xcb1 drivers/net/ieee802154/mcr20a.c:1316 ieee802154_if_add() allocates wpan_dev as netdev's private data, but not init the list in struct wpan_dev. cfg802154_netdev_notifier_call() manage the list when device register/unregister, and may lead to null-ptr-deref. Use INIT_LIST_HEAD() on it to initialize it correctly.
AI Analysis
Technical Summary
CVE-2022-48972 is a vulnerability in the Linux kernel specifically affecting the mac802154 subsystem, which handles IEEE 802.15.4 wireless networking interfaces. The root cause is a missing initialization of a linked list head in the function ieee802154_if_add(). This function allocates a wpan_dev structure as private data for a network device (netdev) but fails to initialize the list member within this structure using INIT_LIST_HEAD(). Consequently, when the kernel later manages this list during device registration or unregistration via the function cfg802154_netdev_notifier_call(), it may dereference a null pointer, leading to a kernel NULL pointer dereference (null-ptr-deref) and a BUG. This can cause a kernel panic or system crash. The vulnerability was identified through kernel fault injection testing and is triggered during network device notifier callbacks, which are part of the kernel's network device management. The patch involves adding the missing INIT_LIST_HEAD() call to properly initialize the list head in the wpan_dev structure, preventing the null pointer dereference. The affected Linux kernel versions include multiple commits identified by the hash fcf39e6e88e9492f6688ec8ba4e1be622b904232. There are no known exploits in the wild at this time, and no CVSS score has been assigned. The vulnerability impacts the stability and availability of systems running affected Linux kernels with mac802154 support enabled, particularly those using IEEE 802.15.4 wireless interfaces such as low-rate wireless personal area networks (LR-WPANs).
Potential Impact
For European organizations, the primary impact of CVE-2022-48972 is on system availability and reliability. Systems running affected Linux kernels with mac802154 support could experience kernel panics or crashes when network devices are registered or unregistered, potentially causing service disruptions. This is particularly relevant for organizations deploying IoT devices, industrial control systems, or wireless sensor networks that rely on IEEE 802.15.4 protocols, which are used in smart metering, building automation, and other critical infrastructure applications common in Europe. While the vulnerability does not directly expose confidentiality or integrity risks, denial of service through kernel crashes can disrupt operations and lead to downtime. Since exploitation requires interaction with network device registration processes, it may be triggered by local or remote administrative actions or device events. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or malicious triggering of the fault. European organizations with embedded Linux devices or network infrastructure using mac802154 should be aware of this risk to maintain operational continuity.
Mitigation Recommendations
1. Apply the official Linux kernel patches that add the missing INIT_LIST_HEAD() initialization in ieee802154_if_add() as soon as they are available from trusted sources or Linux distributions. 2. For organizations using custom or embedded Linux kernels, ensure kernel source code is updated and rebuilt with the fix included. 3. Disable or remove mac802154 support if IEEE 802.15.4 wireless networking is not required, reducing the attack surface. 4. Monitor system logs for kernel BUG messages or null pointer dereferences related to cfg802154_netdev_notifier_call or ieee802154_if_add to detect potential triggering events. 5. Implement strict access controls on device management interfaces to prevent unauthorized registration or unregistration of network devices that could trigger the vulnerability. 6. Conduct thorough testing of kernel updates in staging environments before deployment to production to avoid unintended disruptions. 7. Maintain up-to-date inventory of devices using mac802154 to prioritize patching and risk assessment. 8. Collaborate with device vendors to ensure embedded systems receive timely kernel updates addressing this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-48972: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() Kernel fault injection test reports null-ptr-deref as follows: BUG: kernel NULL pointer dereference, address: 0000000000000008 RIP: 0010:cfg802154_netdev_notifier_call+0x120/0x310 include/linux/list.h:114 Call Trace: <TASK> raw_notifier_call_chain+0x6d/0xa0 kernel/notifier.c:87 call_netdevice_notifiers_info+0x6e/0xc0 net/core/dev.c:1944 unregister_netdevice_many_notify+0x60d/0xcb0 net/core/dev.c:1982 unregister_netdevice_queue+0x154/0x1a0 net/core/dev.c:10879 register_netdevice+0x9a8/0xb90 net/core/dev.c:10083 ieee802154_if_add+0x6ed/0x7e0 net/mac802154/iface.c:659 ieee802154_register_hw+0x29c/0x330 net/mac802154/main.c:229 mcr20a_probe+0xaaa/0xcb1 drivers/net/ieee802154/mcr20a.c:1316 ieee802154_if_add() allocates wpan_dev as netdev's private data, but not init the list in struct wpan_dev. cfg802154_netdev_notifier_call() manage the list when device register/unregister, and may lead to null-ptr-deref. Use INIT_LIST_HEAD() on it to initialize it correctly.
AI-Powered Analysis
Technical Analysis
CVE-2022-48972 is a vulnerability in the Linux kernel specifically affecting the mac802154 subsystem, which handles IEEE 802.15.4 wireless networking interfaces. The root cause is a missing initialization of a linked list head in the function ieee802154_if_add(). This function allocates a wpan_dev structure as private data for a network device (netdev) but fails to initialize the list member within this structure using INIT_LIST_HEAD(). Consequently, when the kernel later manages this list during device registration or unregistration via the function cfg802154_netdev_notifier_call(), it may dereference a null pointer, leading to a kernel NULL pointer dereference (null-ptr-deref) and a BUG. This can cause a kernel panic or system crash. The vulnerability was identified through kernel fault injection testing and is triggered during network device notifier callbacks, which are part of the kernel's network device management. The patch involves adding the missing INIT_LIST_HEAD() call to properly initialize the list head in the wpan_dev structure, preventing the null pointer dereference. The affected Linux kernel versions include multiple commits identified by the hash fcf39e6e88e9492f6688ec8ba4e1be622b904232. There are no known exploits in the wild at this time, and no CVSS score has been assigned. The vulnerability impacts the stability and availability of systems running affected Linux kernels with mac802154 support enabled, particularly those using IEEE 802.15.4 wireless interfaces such as low-rate wireless personal area networks (LR-WPANs).
Potential Impact
For European organizations, the primary impact of CVE-2022-48972 is on system availability and reliability. Systems running affected Linux kernels with mac802154 support could experience kernel panics or crashes when network devices are registered or unregistered, potentially causing service disruptions. This is particularly relevant for organizations deploying IoT devices, industrial control systems, or wireless sensor networks that rely on IEEE 802.15.4 protocols, which are used in smart metering, building automation, and other critical infrastructure applications common in Europe. While the vulnerability does not directly expose confidentiality or integrity risks, denial of service through kernel crashes can disrupt operations and lead to downtime. Since exploitation requires interaction with network device registration processes, it may be triggered by local or remote administrative actions or device events. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or malicious triggering of the fault. European organizations with embedded Linux devices or network infrastructure using mac802154 should be aware of this risk to maintain operational continuity.
Mitigation Recommendations
1. Apply the official Linux kernel patches that add the missing INIT_LIST_HEAD() initialization in ieee802154_if_add() as soon as they are available from trusted sources or Linux distributions. 2. For organizations using custom or embedded Linux kernels, ensure kernel source code is updated and rebuilt with the fix included. 3. Disable or remove mac802154 support if IEEE 802.15.4 wireless networking is not required, reducing the attack surface. 4. Monitor system logs for kernel BUG messages or null pointer dereferences related to cfg802154_netdev_notifier_call or ieee802154_if_add to detect potential triggering events. 5. Implement strict access controls on device management interfaces to prevent unauthorized registration or unregistration of network devices that could trigger the vulnerability. 6. Conduct thorough testing of kernel updates in staging environments before deployment to production to avoid unintended disruptions. 7. Maintain up-to-date inventory of devices using mac802154 to prioritize patching and risk assessment. 8. Collaborate with device vendors to ensure embedded systems receive timely kernel updates addressing this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-08-22T01:27:53.629Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe67b2
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 7/1/2025, 12:41:22 AM
Last updated: 8/7/2025, 10:10:05 PM
Views: 12
Related Threats
CVE-2025-54992: CWE-611: Improper Restriction of XML External Entity Reference in telstra open-kilda
MediumCVE-2025-55012: CWE-288: Authentication Bypass Using an Alternate Path or Channel in zed-industries zed
HighCVE-2025-8854: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in bulletphysics bullet3
HighCVE-2025-8830: OS Command Injection in Linksys RE6250
MediumCVE-2025-54878: CWE-122: Heap-based Buffer Overflow in nasa CryptoLib
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.