Skip to main content

CVE-2022-49472: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49472cvecve-2022-49472
Published: Wed Feb 26 2025 (02/26/2025, 02:13:15 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: phy: micrel: Allow probing without .driver_data Currently, if the .probe element is present in the phy_driver structure and the .driver_data is not, a NULL pointer dereference happens. Allow passing .probe without .driver_data by inserting NULL checks for priv->type.

AI-Powered Analysis

AILast updated: 06/30/2025, 16:11:35 UTC

Technical Analysis

CVE-2022-49472 is a vulnerability identified in the Linux kernel's network PHY (physical layer) driver subsystem, specifically affecting the micrel PHY driver implementation. The issue arises when the phy_driver structure includes a .probe callback function but lacks the associated .driver_data field. Under these conditions, the kernel code attempts to dereference a NULL pointer, leading to a NULL pointer dereference vulnerability. This occurs because the code does not perform adequate NULL checks on the priv->type pointer before accessing it. The vulnerability can cause the kernel to crash or panic, resulting in a denial of service (DoS) condition. The fix involves inserting proper NULL checks to allow the .probe function to be called safely even when .driver_data is absent, thus preventing the NULL pointer dereference. This vulnerability is rooted in the Linux kernel's handling of PHY device probing and is relevant to versions of the kernel that include the affected micrel PHY driver code. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the primary impact of CVE-2022-49472 is the potential for denial of service due to kernel crashes triggered by the NULL pointer dereference in the network PHY driver. Systems running affected Linux kernel versions with the micrel PHY driver enabled could experience unexpected reboots or service interruptions, which can disrupt network connectivity and critical operations. This is particularly significant for infrastructure relying on Linux-based network devices, embedded systems, or servers that use this PHY driver. While this vulnerability does not directly lead to privilege escalation or data leakage, the resulting downtime could affect availability of services, impacting business continuity and operational reliability. Organizations in sectors such as telecommunications, industrial control systems, and cloud service providers that deploy Linux-based network hardware could be more vulnerable. Since no known exploits exist yet, the risk is currently theoretical but should be addressed proactively to avoid future exploitation.

Mitigation Recommendations

To mitigate CVE-2022-49472, European organizations should: 1) Identify and inventory all Linux systems running kernel versions that include the vulnerable micrel PHY driver. 2) Apply the official Linux kernel patches that introduce NULL pointer checks in the phy_driver probe logic as soon as they are available and tested. 3) For embedded or specialized devices where kernel updates are challenging, consider vendor firmware updates or workarounds that disable or replace the affected PHY driver if feasible. 4) Monitor kernel logs for signs of NULL pointer dereference crashes related to PHY probing to detect potential exploitation attempts or instability. 5) Implement robust system monitoring and automated reboot mechanisms to reduce downtime impact in case of crashes. 6) Maintain strict access controls and limit user privileges to reduce the risk of triggering the vulnerability via crafted inputs or configurations. 7) Engage with hardware vendors to ensure updated drivers and firmware are deployed promptly. These steps go beyond generic advice by focusing on the specific driver and kernel subsystem affected and emphasizing proactive patching and monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.579Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe5b4b

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 4:11:35 PM

Last updated: 8/11/2025, 8:31:03 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats