CVE-2022-49072: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: gpio: Restrict usage of GPIO chip irq members before initialization GPIO chip irq members are exposed before they could be completely initialized and this leads to race conditions. One such issue was observed for the gc->irq.domain variable which was accessed through the I2C interface in gpiochip_to_irq() before it could be initialized by gpiochip_add_irqchip(). This resulted in Kernel NULL pointer dereference. Following are the logs for reference :- kernel: Call Trace: kernel: gpiod_to_irq+0x53/0x70 kernel: acpi_dev_gpio_irq_get_by+0x113/0x1f0 kernel: i2c_acpi_get_irq+0xc0/0xd0 kernel: i2c_device_probe+0x28a/0x2a0 kernel: really_probe+0xf2/0x460 kernel: RIP: 0010:gpiochip_to_irq+0x47/0xc0 To avoid such scenarios, restrict usage of GPIO chip irq members before they are completely initialized.
AI Analysis
Technical Summary
CVE-2022-49072 is a vulnerability identified in the Linux kernel related to the General Purpose Input/Output (GPIO) subsystem, specifically concerning the handling of GPIO chip interrupt (irq) members. The vulnerability arises because GPIO chip irq members are accessible before they are fully initialized, leading to potential race conditions. A concrete example involves the gc->irq.domain variable, which is accessed via the I2C interface in the gpiochip_to_irq() function before it is properly initialized by gpiochip_add_irqchip(). This premature access can cause a kernel NULL pointer dereference, resulting in a kernel crash (denial of service). The vulnerability is triggered during device probing, as evidenced by kernel call traces involving functions such as gpiod_to_irq, acpi_dev_gpio_irq_get_by, i2c_acpi_get_irq, and i2c_device_probe. The root cause is the lack of restriction on usage of GPIO chip irq members before complete initialization, which the patch aims to fix by enforcing proper initialization order and access control. This flaw affects Linux kernel versions identified by the given commit hashes, and no known exploits have been reported in the wild as of the publication date. The vulnerability does not have an assigned CVSS score, but it is a kernel-level issue that can cause system instability or denial of service through kernel crashes.
Potential Impact
For European organizations, the impact of CVE-2022-49072 primarily involves potential system instability or denial of service on Linux-based systems that utilize GPIO chips, particularly those interfacing via I2C. This is especially relevant for industries relying on embedded Linux systems, such as manufacturing automation, telecommunications infrastructure, IoT devices, and critical infrastructure control systems. A kernel NULL pointer dereference can cause system crashes, leading to downtime, disruption of services, and potential loss of data integrity if systems reboot unexpectedly. While this vulnerability does not appear to allow privilege escalation or remote code execution directly, the denial of service impact can be significant in environments requiring high availability and reliability. European organizations with Linux-based embedded devices or servers running vulnerable kernel versions may face operational risks. Additionally, the lack of known exploits suggests that attackers have not yet weaponized this vulnerability, but the risk remains if attackers discover ways to trigger it remotely or locally.
Mitigation Recommendations
To mitigate CVE-2022-49072, organizations should: 1) Apply the latest Linux kernel patches that address this vulnerability as soon as they become available from trusted sources or Linux distributions. 2) For embedded systems or custom Linux builds, ensure kernel versions incorporate the fix restricting access to GPIO chip irq members before full initialization. 3) Conduct thorough testing of kernel updates in controlled environments to verify stability and compatibility with existing hardware, especially GPIO-dependent devices. 4) Limit access to systems with vulnerable kernels to trusted users and networks to reduce the risk of local exploitation. 5) Monitor system logs for kernel oops or crash reports related to gpiochip_to_irq or related functions, which may indicate attempts to trigger the vulnerability. 6) For critical infrastructure, implement redundancy and failover mechanisms to minimize downtime in case of kernel crashes. 7) Engage with hardware and software vendors to confirm that their Linux-based products have incorporated the fix or provide guidance on updates. These steps go beyond generic patching advice by emphasizing proactive monitoring, testing, and operational resilience tailored to environments using GPIO interfaces.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Finland
CVE-2022-49072: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: gpio: Restrict usage of GPIO chip irq members before initialization GPIO chip irq members are exposed before they could be completely initialized and this leads to race conditions. One such issue was observed for the gc->irq.domain variable which was accessed through the I2C interface in gpiochip_to_irq() before it could be initialized by gpiochip_add_irqchip(). This resulted in Kernel NULL pointer dereference. Following are the logs for reference :- kernel: Call Trace: kernel: gpiod_to_irq+0x53/0x70 kernel: acpi_dev_gpio_irq_get_by+0x113/0x1f0 kernel: i2c_acpi_get_irq+0xc0/0xd0 kernel: i2c_device_probe+0x28a/0x2a0 kernel: really_probe+0xf2/0x460 kernel: RIP: 0010:gpiochip_to_irq+0x47/0xc0 To avoid such scenarios, restrict usage of GPIO chip irq members before they are completely initialized.
AI-Powered Analysis
Technical Analysis
CVE-2022-49072 is a vulnerability identified in the Linux kernel related to the General Purpose Input/Output (GPIO) subsystem, specifically concerning the handling of GPIO chip interrupt (irq) members. The vulnerability arises because GPIO chip irq members are accessible before they are fully initialized, leading to potential race conditions. A concrete example involves the gc->irq.domain variable, which is accessed via the I2C interface in the gpiochip_to_irq() function before it is properly initialized by gpiochip_add_irqchip(). This premature access can cause a kernel NULL pointer dereference, resulting in a kernel crash (denial of service). The vulnerability is triggered during device probing, as evidenced by kernel call traces involving functions such as gpiod_to_irq, acpi_dev_gpio_irq_get_by, i2c_acpi_get_irq, and i2c_device_probe. The root cause is the lack of restriction on usage of GPIO chip irq members before complete initialization, which the patch aims to fix by enforcing proper initialization order and access control. This flaw affects Linux kernel versions identified by the given commit hashes, and no known exploits have been reported in the wild as of the publication date. The vulnerability does not have an assigned CVSS score, but it is a kernel-level issue that can cause system instability or denial of service through kernel crashes.
Potential Impact
For European organizations, the impact of CVE-2022-49072 primarily involves potential system instability or denial of service on Linux-based systems that utilize GPIO chips, particularly those interfacing via I2C. This is especially relevant for industries relying on embedded Linux systems, such as manufacturing automation, telecommunications infrastructure, IoT devices, and critical infrastructure control systems. A kernel NULL pointer dereference can cause system crashes, leading to downtime, disruption of services, and potential loss of data integrity if systems reboot unexpectedly. While this vulnerability does not appear to allow privilege escalation or remote code execution directly, the denial of service impact can be significant in environments requiring high availability and reliability. European organizations with Linux-based embedded devices or servers running vulnerable kernel versions may face operational risks. Additionally, the lack of known exploits suggests that attackers have not yet weaponized this vulnerability, but the risk remains if attackers discover ways to trigger it remotely or locally.
Mitigation Recommendations
To mitigate CVE-2022-49072, organizations should: 1) Apply the latest Linux kernel patches that address this vulnerability as soon as they become available from trusted sources or Linux distributions. 2) For embedded systems or custom Linux builds, ensure kernel versions incorporate the fix restricting access to GPIO chip irq members before full initialization. 3) Conduct thorough testing of kernel updates in controlled environments to verify stability and compatibility with existing hardware, especially GPIO-dependent devices. 4) Limit access to systems with vulnerable kernels to trusted users and networks to reduce the risk of local exploitation. 5) Monitor system logs for kernel oops or crash reports related to gpiochip_to_irq or related functions, which may indicate attempts to trigger the vulnerability. 6) For critical infrastructure, implement redundancy and failover mechanisms to minimize downtime in case of kernel crashes. 7) Engage with hardware and software vendors to confirm that their Linux-based products have incorporated the fix or provide guidance on updates. These steps go beyond generic patching advice by emphasizing proactive monitoring, testing, and operational resilience tailored to environments using GPIO interfaces.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T01:49:39.245Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe6a81
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 7/1/2025, 1:56:14 AM
Last updated: 8/1/2025, 9:40:07 AM
Views: 15
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.