CVE-2022-49692

In the Linux kernel, the following vulnerability has been resolved: net: phy: at803x: fix NULL pointer dereference on AR9331 PHY Latest kernel will explode on the PHY interrupt config, since it depends now on allocated priv. So, run probe to allocate priv to fix it. ar9331_switch ethernet.1:10 lan0 (uninitialized): PHY [!ahb!ethernet@1a000000!mdio!switch@10:00] driver [Qualcomm Atheros AR9331 built-in PHY] (irq=13) CPU 0 Unable to handle kernel paging request at virtual address 0000000a, epc == 8050e8a8, ra == 80504b34 ... Call Trace: [<8050e8a8>] at803x_config_intr+0x5c/0xd0 [<80504b34>] phy_request_interrupt+0xa8/0xd0 [<8050289c>] phylink_bringup_phy+0x2d8/0x3ac [<80502b68>] phylink_fwnode_phy_connect+0x118/0x130 [<8074d8ec>] dsa_slave_create+0x270/0x420 [<80743b04>] dsa_port_setup+0x12c/0x148 [<8074580c>] dsa_register_switch+0xaf0/0xcc0 [<80511344>] ar9331_sw_probe+0x370/0x388 [<8050cb78>] mdio_probe+0x44/0x70 [<804df300>] really_probe+0x200/0x424 [<804df7b4>] __driver_probe_device+0x290/0x298 [<804df810>] driver_probe_device+0x54/0xe4 [<804dfd50>] __device_attach_driver+0xe4/0x130 [<804dcb00>] bus_for_each_drv+0xb4/0xd8 [<804dfac4>] __device_attach+0x104/0x1a4 [<804ddd24>] bus_probe_device+0x48/0xc4 [<804deb44>] deferred_probe_work_func+0xf0/0x10c [<800a0ffc>] process_one_work+0x314/0x4d4 [<800a17fc>] worker_thread+0x2a4/0x354 [<800a9a54>] kthread+0x134/0x13c [<8006306c>] ret_from_kernel_thread+0x14/0x1c Same Issue would affect some other PHYs (QCA8081, QCA9561), so fix it too.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*

History

11 Mar 2025, 22:27

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/66fa352215e8455ba2e5f33793535795bd3e36ca - () https://git.kernel.org/stable/c/66fa352215e8455ba2e5f33793535795bd3e36ca - Patch
References () https://git.kernel.org/stable/c/9926de7315be3d606cc011a305ad9adb9e8e14c9 - () https://git.kernel.org/stable/c/9926de7315be3d606cc011a305ad9adb9e8e14c9 - Patch
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: phy: at803x: se corrige la desreferencia de puntero NULL en AR9331 PHY. El kernel más reciente explotará en la configuración de interrupción de PHY, ya que ahora depende de privilegios asignados. Por lo tanto, ejecute la sonda para asignar privilegios para solucionarlo. ar9331_switch ethernet.1:10 lan0 (uninitialized): PHY [!ahb!ethernet@1a000000!mdio!switch@10:00] driver [Qualcomm Atheros AR9331 built-in PHY] (irq=13) CPU 0 Unable to handle kernel paging request at virtual address 0000000a, epc == 8050e8a8, ra == 80504b34 ... Call Trace: [&lt;8050e8a8&gt;] at803x_config_intr+0x5c/0xd0 [&lt;80504b34&gt;] phy_request_interrupt+0xa8/0xd0 [&lt;8050289c&gt;] phylink_bringup_phy+0x2d8/0x3ac [&lt;80502b68&gt;] phylink_fwnode_phy_connect+0x118/0x130 [&lt;8074d8ec&gt;] dsa_slave_create+0x270/0x420 [&lt;80743b04&gt;] dsa_port_setup+0x12c/0x148 [&lt;8074580c&gt;] dsa_register_switch+0xaf0/0xcc0 [&lt;80511344&gt;] ar9331_sw_probe+0x370/0x388 [&lt;8050cb78&gt;] mdio_probe+0x44/0x70 [&lt;804df300&gt;] really_probe+0x200/0x424 [&lt;804df7b4&gt;] __driver_probe_device+0x290/0x298 [&lt;804df810&gt;] driver_probe_device+0x54/0xe4 [&lt;804dfd50&gt;] __device_attach_driver+0xe4/0x130 [&lt;804dcb00&gt;] bus_for_each_drv+0xb4/0xd8 [&lt;804dfac4&gt;] __device_attach+0x104/0x1a4 [&lt;804ddd24&gt;] bus_probe_device+0x48/0xc4 [&lt;804deb44&gt;] deferred_probe_work_func+0xf0/0x10c [&lt;800a0ffc&gt;] process_one_work+0x314/0x4d4 [&lt;800a17fc&gt;] worker_thread+0x2a4/0x354 [&lt;800a9a54&gt;] kthread+0x134/0x13c [&lt;8006306c&gt;] ret_from_kernel_thread+0x14/0x1c El mismo problema afectaría a algunos otros PHY (QCA8081, QCA9561), así que corríjalo también.
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-11 22:27


NVD link : CVE-2022-49692

Mitre link : CVE-2022-49692

CVE.ORG link : CVE-2022-49692


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference