Skip to main content

CVE-2022-49083: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49083cvecve-2022-49083
Published: Wed Feb 26 2025 (02/26/2025, 01:54:42 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: iommu/omap: Fix regression in probe for NULL pointer dereference Commit 3f6634d997db ("iommu: Use right way to retrieve iommu_ops") started triggering a NULL pointer dereference for some omap variants: __iommu_probe_device from probe_iommu_group+0x2c/0x38 probe_iommu_group from bus_for_each_dev+0x74/0xbc bus_for_each_dev from bus_iommu_probe+0x34/0x2e8 bus_iommu_probe from bus_set_iommu+0x80/0xc8 bus_set_iommu from omap_iommu_init+0x88/0xcc omap_iommu_init from do_one_initcall+0x44/0x24 This is caused by omap iommu probe returning 0 instead of ERR_PTR(-ENODEV) as noted by Jason Gunthorpe <jgg@ziepe.ca>. Looks like the regression already happened with an earlier commit 6785eb9105e3 ("iommu/omap: Convert to probe/release_device() call-backs") that changed the function return type and missed converting one place.

AI-Powered Analysis

AILast updated: 07/01/2025, 01:58:35 UTC

Technical Analysis

CVE-2022-49083 is a vulnerability in the Linux kernel related to the IOMMU (Input-Output Memory Management Unit) subsystem, specifically affecting the OMAP (Open Multimedia Applications Platform) variant. The issue arises from a regression introduced by commit 6785eb9105e3, which converted the iommu/omap driver to use probe/release_device callbacks but missed converting one place, leading to incorrect error handling. Subsequently, commit 3f6634d997db attempted to fix the retrieval of iommu_ops but inadvertently triggered a NULL pointer dereference during the probing of certain OMAP devices. The root cause is that the omap iommu probe function returns 0 instead of the expected ERR_PTR(-ENODEV) error pointer when a device is not found, causing the kernel to dereference a NULL pointer in the __iommu_probe_device function. This results in a kernel crash (panic) due to the NULL pointer dereference during device initialization. The vulnerability affects specific Linux kernel versions containing the faulty commits and is resolved by correcting the return value handling in the probe function. There are no known exploits in the wild, and no CVSS score has been assigned yet. The flaw is a regression, meaning it was introduced by a recent change rather than being a longstanding issue. The impact is primarily a denial of service (DoS) via kernel crash during device initialization on affected hardware platforms using OMAP IOMMU implementations.

Potential Impact

For European organizations, the primary impact of CVE-2022-49083 is potential denial of service on systems running affected Linux kernel versions on OMAP-based hardware. OMAP processors are commonly found in embedded systems, industrial control devices, and specialized telecommunications equipment. Organizations relying on embedded Linux devices with OMAP SoCs—such as in manufacturing, automotive, or network infrastructure—may experience system instability or crashes during device initialization, leading to downtime or service interruptions. While this vulnerability does not directly enable privilege escalation or data compromise, the resulting kernel panic could disrupt critical services or embedded applications. Given the increasing use of Linux in IoT and industrial environments across Europe, the vulnerability could affect sectors such as manufacturing automation, smart grid infrastructure, and telecommunications. However, the impact is limited to specific hardware platforms and kernel versions, reducing the overall risk to general-purpose Linux servers or desktops. No known exploits exist, so the threat is currently theoretical but should be addressed proactively to avoid operational disruptions.

Mitigation Recommendations

To mitigate CVE-2022-49083, European organizations should: 1) Identify and inventory Linux systems running on OMAP-based hardware, particularly embedded and industrial devices. 2) Verify kernel versions and check for the presence of the faulty commits (notably 6785eb9105e3 and 3f6634d997db). 3) Apply vendor-provided patches or upgrade to Linux kernel versions where the regression is fixed, ensuring the probe function correctly returns ERR_PTR(-ENODEV) instead of 0. 4) For devices where kernel upgrades are not immediately feasible, implement monitoring to detect kernel panics or crashes related to iommu/omap initialization and plan for maintenance windows to apply fixes. 5) Collaborate with hardware and software vendors to obtain updated firmware or kernel builds addressing this issue. 6) Conduct thorough testing of updated kernels in controlled environments before deployment to avoid regressions. 7) Consider isolating critical embedded devices from untrusted networks to reduce exposure to potential triggering conditions. These steps go beyond generic advice by focusing on hardware-specific identification, patch verification, and operational monitoring tailored to OMAP-based Linux systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.248Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982fc4522896dcbe6adc

Added to database: 5/21/2025, 9:09:03 AM

Last enriched: 7/1/2025, 1:58:35 AM

Last updated: 7/30/2025, 7:26:37 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats