Skip to main content

CVE-2022-49805: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49805cvecve-2022-49805
Published: Thu May 01 2025 (05/01/2025, 14:09:32 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: lan966x: Fix potential null-ptr-deref in lan966x_stats_init() lan966x_stats_init() calls create_singlethread_workqueue() and not checked the ret value, which may return NULL. And a null-ptr-deref may happen: lan966x_stats_init() create_singlethread_workqueue() # failed, lan966x->stats_queue is NULL queue_delayed_work() queue_delayed_work_on() __queue_delayed_work() # warning here, but continue __queue_work() # access wq->flags, null-ptr-deref Check the ret value and return -ENOMEM if it is NULL.

AI-Powered Analysis

AILast updated: 06/30/2025, 01:55:05 UTC

Technical Analysis

CVE-2022-49805 is a vulnerability identified in the Linux kernel specifically within the lan966x network driver code. The issue arises in the function lan966x_stats_init(), which is responsible for initializing statistics-related workqueues by calling create_singlethread_workqueue(). This function can fail and return NULL, but the return value was not checked before subsequent usage. As a result, if create_singlethread_workqueue() returns NULL, the lan966x->stats_queue pointer remains NULL. Later, when queue_delayed_work() is called on this NULL pointer, it leads to a null pointer dereference (null-ptr-deref) in the kernel. This dereference occurs when the kernel attempts to access the flags member of the workqueue structure, which is NULL, causing a kernel panic or system crash. The vulnerability is a denial-of-service (DoS) type, as it can cause the affected system to crash or become unresponsive. The fix involves adding a check for the return value of create_singlethread_workqueue() and returning an error code (-ENOMEM) if the workqueue creation fails, preventing the null pointer dereference. This vulnerability affects specific versions of the Linux kernel identified by commit hashes, and it is related to the lan966x network driver, which is used for certain network hardware. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential for denial-of-service conditions on Linux systems running the affected kernel versions with the lan966x network driver enabled. This could lead to unexpected system crashes or reboots, disrupting critical network services or infrastructure. Organizations relying on Linux-based network devices or servers that utilize this driver may experience service interruptions, affecting business continuity and operational stability. While this vulnerability does not directly lead to privilege escalation or data breaches, the availability impact can be significant, especially in environments where uptime and network reliability are critical, such as telecommunications, data centers, and industrial control systems. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed proactively to prevent future exploitation. Additionally, the vulnerability could be leveraged by attackers with local access or the ability to trigger the affected code path, emphasizing the need for patching in sensitive or exposed environments.

Mitigation Recommendations

To mitigate CVE-2022-49805, European organizations should: 1) Identify Linux systems running the affected kernel versions and verify if the lan966x network driver is in use. 2) Apply the official Linux kernel patches or updates that include the fix for this vulnerability, ensuring that the lan966x_stats_init() function properly checks the return value of create_singlethread_workqueue(). 3) If immediate patching is not possible, consider disabling the lan966x driver if it is not required for operational purposes to reduce exposure. 4) Implement monitoring for kernel panics or unexpected reboots that could indicate attempts to exploit this vulnerability. 5) Maintain strict access controls and limit local access to systems running the vulnerable driver to reduce the risk of exploitation. 6) Incorporate this vulnerability into vulnerability management and patching workflows to ensure timely remediation. 7) Engage with hardware vendors or Linux distribution maintainers for guidance on updates and compatibility to avoid operational disruptions during patching.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-01T14:05:17.225Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe4c75

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 6/30/2025, 1:55:05 AM

Last updated: 8/14/2025, 8:04:05 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats