CVE-2022-48972
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
21/10/2024
Last modified:
25/10/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add()<br />
<br />
Kernel fault injection test reports null-ptr-deref as follows:<br />
<br />
BUG: kernel NULL pointer dereference, address: 0000000000000008<br />
RIP: 0010:cfg802154_netdev_notifier_call+0x120/0x310 include/linux/list.h:114<br />
Call Trace:<br />
<br />
raw_notifier_call_chain+0x6d/0xa0 kernel/notifier.c:87<br />
call_netdevice_notifiers_info+0x6e/0xc0 net/core/dev.c:1944<br />
unregister_netdevice_many_notify+0x60d/0xcb0 net/core/dev.c:1982<br />
unregister_netdevice_queue+0x154/0x1a0 net/core/dev.c:10879<br />
register_netdevice+0x9a8/0xb90 net/core/dev.c:10083<br />
ieee802154_if_add+0x6ed/0x7e0 net/mac802154/iface.c:659<br />
ieee802154_register_hw+0x29c/0x330 net/mac802154/main.c:229<br />
mcr20a_probe+0xaaa/0xcb1 drivers/net/ieee802154/mcr20a.c:1316<br />
<br />
ieee802154_if_add() allocates wpan_dev as netdev&#39;s private data, but not<br />
init the list in struct wpan_dev. cfg802154_netdev_notifier_call() manage<br />
the list when device register/unregister, and may lead to null-ptr-deref.<br />
<br />
Use INIT_LIST_HEAD() on it to initialize it correctly.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.19 (including) | 4.9.336 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.302 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.269 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.227 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.159 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.83 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1831d4540406708e48239cf38fd9c3b7ea98e08f
- https://git.kernel.org/stable/c/42c319635c0cf7eb36eccac6cda76532f47b61a3
- https://git.kernel.org/stable/c/623918f40fa68e3bb21312a3fafb90f491bf5358
- https://git.kernel.org/stable/c/7410f4d1221bb182510b7778ab6eefa8b9b7102d
- https://git.kernel.org/stable/c/9980a3ea20de40c83817877106c909cb032692d2
- https://git.kernel.org/stable/c/a110287ef4a423980309490df632e1c1e73b3dc9
- https://git.kernel.org/stable/c/b3d72d3135d2ef68296c1ee174436efd65386f04
- https://git.kernel.org/stable/c/f00c84fb1635c27ba24ec5df65d5bd7d7dc00008



