CVE-2022-48972

Source
https://cve.org/CVERecord?id=CVE-2022-48972
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48972.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48972
Downstream
Related
Published
2024-10-21T20:05:53.061Z
Modified
2026-04-11T12:43:21.392087Z
Summary
mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add()
Details

In the Linux kernel, the following vulnerability has been resolved:

mac802154: fix missing INITLISTHEAD in ieee802154ifadd()

Kernel fault injection test reports null-ptr-deref as follows:

BUG: kernel NULL pointer dereference, address: 0000000000000008 RIP: 0010:cfg802154netdevnotifiercall+0x120/0x310 include/linux/list.h:114 Call Trace: <TASK> rawnotifiercallchain+0x6d/0xa0 kernel/notifier.c:87 callnetdevicenotifiersinfo+0x6e/0xc0 net/core/dev.c:1944 unregisternetdevicemanynotify+0x60d/0xcb0 net/core/dev.c:1982 unregisternetdevicequeue+0x154/0x1a0 net/core/dev.c:10879 registernetdevice+0x9a8/0xb90 net/core/dev.c:10083 ieee802154ifadd+0x6ed/0x7e0 net/mac802154/iface.c:659 ieee802154registerhw+0x29c/0x330 net/mac802154/main.c:229 mcr20aprobe+0xaaa/0xcb1 drivers/net/ieee802154/mcr20a.c:1316

ieee802154ifadd() allocates wpandev as netdev's private data, but not init the list in struct wpandev. cfg802154netdevnotifier_call() manage the list when device register/unregister, and may lead to null-ptr-deref.

Use INITLISTHEAD() on it to initialize it correctly.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48972.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fcf39e6e88e9492f6688ec8ba4e1be622b904232
Fixed
7410f4d1221bb182510b7778ab6eefa8b9b7102d
Fixed
9980a3ea20de40c83817877106c909cb032692d2
Fixed
f00c84fb1635c27ba24ec5df65d5bd7d7dc00008
Fixed
1831d4540406708e48239cf38fd9c3b7ea98e08f
Fixed
42c319635c0cf7eb36eccac6cda76532f47b61a3
Fixed
a110287ef4a423980309490df632e1c1e73b3dc9
Fixed
623918f40fa68e3bb21312a3fafb90f491bf5358
Fixed
b3d72d3135d2ef68296c1ee174436efd65386f04

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48972.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.19.0
Fixed
4.9.336
Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.14.302
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.269
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.227
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.159
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.83
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.13

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48972.json"