CVE-2022-49010: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) Check for null before removing sysfs attrs If coretemp_add_core() gets an error then pdata->core_data[indx] is already NULL and has been kfreed. Don't pass that to sysfs_remove_group() as that will crash in sysfs_remove_group(). [Shortened for readability] [91854.020159] sysfs: cannot create duplicate filename '/devices/platform/coretemp.0/hwmon/hwmon2/temp20_label' <cpu offline> [91855.126115] BUG: kernel NULL pointer dereference, address: 0000000000000188 [91855.165103] #PF: supervisor read access in kernel mode [91855.194506] #PF: error_code(0x0000) - not-present page [91855.224445] PGD 0 P4D 0 [91855.238508] Oops: 0000 [#1] PREEMPT SMP PTI ... [91855.342716] RIP: 0010:sysfs_remove_group+0xc/0x80 ... [91855.796571] Call Trace: [91855.810524] coretemp_cpu_offline+0x12b/0x1dd [coretemp] [91855.841738] ? coretemp_cpu_online+0x180/0x180 [coretemp] [91855.871107] cpuhp_invoke_callback+0x105/0x4b0 [91855.893432] cpuhp_thread_fun+0x8e/0x150 ... Fix this by checking for NULL first.
AI Analysis
Technical Summary
CVE-2022-49010 is a vulnerability identified in the Linux kernel's hardware monitoring (hwmon) subsystem, specifically within the coretemp driver responsible for CPU temperature monitoring. The issue arises when the coretemp_add_core() function encounters an error condition. In such cases, the pdata->core_data[indx] pointer is already NULL and has been freed (kfreed). However, the vulnerable code attempts to pass this NULL pointer to sysfs_remove_group(), a kernel function that removes a group of sysfs attributes. Passing a NULL pointer to sysfs_remove_group() leads to a kernel NULL pointer dereference, causing a kernel crash (kernel oops) and potential system instability or denial of service. The vulnerability manifests during CPU offline events, as indicated by kernel logs showing duplicate sysfs filename creation errors and supervisor read access faults. The root cause is the lack of a NULL check before calling sysfs_remove_group(), which has been addressed by adding the necessary NULL pointer validation to prevent the crash. This vulnerability affects Linux kernel versions identified by the commit hash 199e0de7f5df31a4fc485d4aaaf8a07718252ace and potentially other versions with similar code. No known exploits are currently reported in the wild. The vulnerability is a stability and availability issue rather than a direct confidentiality or integrity compromise, but it can cause system crashes and disrupt operations on affected Linux systems running the vulnerable kernel version.
Potential Impact
For European organizations, the impact of CVE-2022-49010 primarily concerns system availability and operational stability. Linux is widely used across European enterprises, government agencies, and critical infrastructure for servers, embedded systems, and network devices. A kernel crash triggered by this vulnerability could lead to unexpected system reboots or downtime, affecting services reliant on Linux-based systems. This is particularly critical for sectors such as finance, telecommunications, healthcare, and manufacturing, where high availability is essential. Although the vulnerability does not directly expose sensitive data or allow privilege escalation, repeated crashes or denial of service could disrupt business continuity and lead to financial losses or service degradation. Systems that dynamically manage CPU states or rely heavily on hardware monitoring are more susceptible. Additionally, environments with automated CPU offline/online operations or power management features might trigger the bug more frequently. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or malicious triggering of the kernel crash, especially in complex or high-load environments.
Mitigation Recommendations
To mitigate CVE-2022-49010, European organizations should: 1) Apply the official Linux kernel patch that adds the NULL pointer check before calling sysfs_remove_group() as soon as it becomes available from their Linux distribution vendors or kernel maintainers. 2) Regularly update Linux kernels to the latest stable versions to incorporate security fixes and stability improvements. 3) Monitor kernel logs for symptoms such as duplicate sysfs filename errors or kernel oops related to coretemp during CPU offline events, which may indicate attempts to trigger this vulnerability. 4) Implement robust system monitoring and automated reboot or failover mechanisms to minimize downtime in case of kernel crashes. 5) For critical systems, consider isolating or limiting CPU offline/online operations if feasible, to reduce exposure to the triggering condition until patches are applied. 6) Engage with Linux distribution security advisories and subscribe to vulnerability notifications to stay informed about updates related to this issue. 7) Conduct thorough testing of kernel updates in staging environments before deployment to production to ensure compatibility and stability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
CVE-2022-49010: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) Check for null before removing sysfs attrs If coretemp_add_core() gets an error then pdata->core_data[indx] is already NULL and has been kfreed. Don't pass that to sysfs_remove_group() as that will crash in sysfs_remove_group(). [Shortened for readability] [91854.020159] sysfs: cannot create duplicate filename '/devices/platform/coretemp.0/hwmon/hwmon2/temp20_label' <cpu offline> [91855.126115] BUG: kernel NULL pointer dereference, address: 0000000000000188 [91855.165103] #PF: supervisor read access in kernel mode [91855.194506] #PF: error_code(0x0000) - not-present page [91855.224445] PGD 0 P4D 0 [91855.238508] Oops: 0000 [#1] PREEMPT SMP PTI ... [91855.342716] RIP: 0010:sysfs_remove_group+0xc/0x80 ... [91855.796571] Call Trace: [91855.810524] coretemp_cpu_offline+0x12b/0x1dd [coretemp] [91855.841738] ? coretemp_cpu_online+0x180/0x180 [coretemp] [91855.871107] cpuhp_invoke_callback+0x105/0x4b0 [91855.893432] cpuhp_thread_fun+0x8e/0x150 ... Fix this by checking for NULL first.
AI-Powered Analysis
Technical Analysis
CVE-2022-49010 is a vulnerability identified in the Linux kernel's hardware monitoring (hwmon) subsystem, specifically within the coretemp driver responsible for CPU temperature monitoring. The issue arises when the coretemp_add_core() function encounters an error condition. In such cases, the pdata->core_data[indx] pointer is already NULL and has been freed (kfreed). However, the vulnerable code attempts to pass this NULL pointer to sysfs_remove_group(), a kernel function that removes a group of sysfs attributes. Passing a NULL pointer to sysfs_remove_group() leads to a kernel NULL pointer dereference, causing a kernel crash (kernel oops) and potential system instability or denial of service. The vulnerability manifests during CPU offline events, as indicated by kernel logs showing duplicate sysfs filename creation errors and supervisor read access faults. The root cause is the lack of a NULL check before calling sysfs_remove_group(), which has been addressed by adding the necessary NULL pointer validation to prevent the crash. This vulnerability affects Linux kernel versions identified by the commit hash 199e0de7f5df31a4fc485d4aaaf8a07718252ace and potentially other versions with similar code. No known exploits are currently reported in the wild. The vulnerability is a stability and availability issue rather than a direct confidentiality or integrity compromise, but it can cause system crashes and disrupt operations on affected Linux systems running the vulnerable kernel version.
Potential Impact
For European organizations, the impact of CVE-2022-49010 primarily concerns system availability and operational stability. Linux is widely used across European enterprises, government agencies, and critical infrastructure for servers, embedded systems, and network devices. A kernel crash triggered by this vulnerability could lead to unexpected system reboots or downtime, affecting services reliant on Linux-based systems. This is particularly critical for sectors such as finance, telecommunications, healthcare, and manufacturing, where high availability is essential. Although the vulnerability does not directly expose sensitive data or allow privilege escalation, repeated crashes or denial of service could disrupt business continuity and lead to financial losses or service degradation. Systems that dynamically manage CPU states or rely heavily on hardware monitoring are more susceptible. Additionally, environments with automated CPU offline/online operations or power management features might trigger the bug more frequently. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or malicious triggering of the kernel crash, especially in complex or high-load environments.
Mitigation Recommendations
To mitigate CVE-2022-49010, European organizations should: 1) Apply the official Linux kernel patch that adds the NULL pointer check before calling sysfs_remove_group() as soon as it becomes available from their Linux distribution vendors or kernel maintainers. 2) Regularly update Linux kernels to the latest stable versions to incorporate security fixes and stability improvements. 3) Monitor kernel logs for symptoms such as duplicate sysfs filename errors or kernel oops related to coretemp during CPU offline events, which may indicate attempts to trigger this vulnerability. 4) Implement robust system monitoring and automated reboot or failover mechanisms to minimize downtime in case of kernel crashes. 5) For critical systems, consider isolating or limiting CPU offline/online operations if feasible, to reduce exposure to the triggering condition until patches are applied. 6) Engage with Linux distribution security advisories and subscribe to vulnerability notifications to stay informed about updates related to this issue. 7) Conduct thorough testing of kernel updates in staging environments before deployment to production to ensure compatibility and stability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-08-22T01:27:53.644Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe68cd
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 7/1/2025, 1:10:45 AM
Last updated: 8/15/2025, 1:53:42 AM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.