CVE-2022-49029: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails Smatch report warning as follows: drivers/hwmon/ibmpex.c:509 ibmpex_register_bmc() warn: '&data->list' not removed from list If ibmpex_find_sensors() fails in ibmpex_register_bmc(), data will be freed, but data->list will not be removed from driver_data.bmc_data, then list traversal may cause UAF. Fix by removeing it from driver_data.bmc_data before free().
AI Analysis
Technical Summary
CVE-2022-49029 is a use-after-free (UAF) vulnerability identified in the Linux kernel's hardware monitoring (hwmon) subsystem, specifically within the ibmpex driver. The vulnerability arises in the function ibmpex_register_bmc(), which is responsible for registering Baseboard Management Controller (BMC) sensors. If the function ibmpex_find_sensors() fails during this registration process, the allocated data structure is freed, but a linked list node (data->list) is not properly removed from the driver_data.bmc_data list. This improper cleanup leads to a dangling pointer in the list, which can cause a use-after-free condition when the list is later traversed. Such UAF vulnerabilities can lead to undefined behavior including kernel crashes, memory corruption, or potentially privilege escalation if exploited. The root cause is a missing removal of the list element before freeing the associated memory. The fix involves ensuring that data->list is removed from the linked list before the data structure is freed, preventing the UAF scenario. This vulnerability affects specific Linux kernel versions identified by the commit hash 57c7c3a0fdea95eddcaeba31e7ca7dfc917682ab and likely related kernel releases around that commit. There are no known exploits in the wild as of the publication date, and no CVSS score has been assigned yet. The vulnerability was publicly disclosed on October 21, 2024.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with the ibmpex driver enabled, which is typically found on IBM hardware platforms or systems using IBM BMC sensors. Exploitation could lead to kernel memory corruption, causing system instability or crashes, which can disrupt critical services. In a worst-case scenario, attackers might leverage this vulnerability to escalate privileges to kernel level, gaining full control over the affected system. This is particularly concerning for data centers, cloud providers, and enterprises relying on IBM hardware or Linux-based infrastructure for critical operations. The impact extends to confidentiality, integrity, and availability of systems, as kernel-level compromise can bypass most security controls. Given the lack of known exploits, the immediate threat may be low, but the vulnerability's nature means it could be targeted once exploit code becomes available. European organizations with sensitive data or critical infrastructure should prioritize remediation to avoid potential exploitation.
Mitigation Recommendations
Organizations should promptly identify Linux systems running affected kernel versions with the ibmpex driver enabled. Applying the official Linux kernel patches that fix the UAF condition is the most effective mitigation. If immediate patching is not feasible, consider disabling the ibmpex driver if it is not required for system operation, to eliminate the attack surface. Additionally, implement kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), Kernel Page Table Isolation (KPTI), and enable security modules like SELinux or AppArmor to reduce exploitation likelihood. Regularly monitor system logs for unusual kernel errors or crashes that might indicate exploitation attempts. For environments using IBM hardware, coordinate with hardware vendors for firmware updates or advisories related to BMC sensor management. Finally, maintain robust incident response plans to quickly address any signs of compromise related to kernel vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2022-49029: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails Smatch report warning as follows: drivers/hwmon/ibmpex.c:509 ibmpex_register_bmc() warn: '&data->list' not removed from list If ibmpex_find_sensors() fails in ibmpex_register_bmc(), data will be freed, but data->list will not be removed from driver_data.bmc_data, then list traversal may cause UAF. Fix by removeing it from driver_data.bmc_data before free().
AI-Powered Analysis
Technical Analysis
CVE-2022-49029 is a use-after-free (UAF) vulnerability identified in the Linux kernel's hardware monitoring (hwmon) subsystem, specifically within the ibmpex driver. The vulnerability arises in the function ibmpex_register_bmc(), which is responsible for registering Baseboard Management Controller (BMC) sensors. If the function ibmpex_find_sensors() fails during this registration process, the allocated data structure is freed, but a linked list node (data->list) is not properly removed from the driver_data.bmc_data list. This improper cleanup leads to a dangling pointer in the list, which can cause a use-after-free condition when the list is later traversed. Such UAF vulnerabilities can lead to undefined behavior including kernel crashes, memory corruption, or potentially privilege escalation if exploited. The root cause is a missing removal of the list element before freeing the associated memory. The fix involves ensuring that data->list is removed from the linked list before the data structure is freed, preventing the UAF scenario. This vulnerability affects specific Linux kernel versions identified by the commit hash 57c7c3a0fdea95eddcaeba31e7ca7dfc917682ab and likely related kernel releases around that commit. There are no known exploits in the wild as of the publication date, and no CVSS score has been assigned yet. The vulnerability was publicly disclosed on October 21, 2024.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with the ibmpex driver enabled, which is typically found on IBM hardware platforms or systems using IBM BMC sensors. Exploitation could lead to kernel memory corruption, causing system instability or crashes, which can disrupt critical services. In a worst-case scenario, attackers might leverage this vulnerability to escalate privileges to kernel level, gaining full control over the affected system. This is particularly concerning for data centers, cloud providers, and enterprises relying on IBM hardware or Linux-based infrastructure for critical operations. The impact extends to confidentiality, integrity, and availability of systems, as kernel-level compromise can bypass most security controls. Given the lack of known exploits, the immediate threat may be low, but the vulnerability's nature means it could be targeted once exploit code becomes available. European organizations with sensitive data or critical infrastructure should prioritize remediation to avoid potential exploitation.
Mitigation Recommendations
Organizations should promptly identify Linux systems running affected kernel versions with the ibmpex driver enabled. Applying the official Linux kernel patches that fix the UAF condition is the most effective mitigation. If immediate patching is not feasible, consider disabling the ibmpex driver if it is not required for system operation, to eliminate the attack surface. Additionally, implement kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), Kernel Page Table Isolation (KPTI), and enable security modules like SELinux or AppArmor to reduce exploitation likelihood. Regularly monitor system logs for unusual kernel errors or crashes that might indicate exploitation attempts. For environments using IBM hardware, coordinate with hardware vendors for firmware updates or advisories related to BMC sensor management. Finally, maintain robust incident response plans to quickly address any signs of compromise related to kernel vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-08-22T01:27:53.651Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe697e
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 7/1/2025, 1:28:27 AM
Last updated: 12/2/2025, 8:20:10 AM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10971: CWE-922 Insecure Storage of Sensitive Information in FERMAX ELECTRÓNICA S.A.U MeetMe
HighCVE-2025-13696: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in softdiscover Zigaform – Price Calculator & Cost Estimation Form Builder Lite
MediumCVE-2025-11726: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13685: CWE-352 Cross-Site Request Forgery (CSRF) in ays-pro Photo Gallery by Ays – Responsive Image Gallery
MediumCVE-2025-13140: CWE-352 Cross-Site Request Forgery (CSRF) in devsoftbaltic SurveyJS: Drag & Drop WordPress Form Builder to create, style and embed multiple forms of any complexity
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.