{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-49021","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-08-22T01:27:53.649Z","datePublished":"2024-10-21T20:06:28.608Z","dateUpdated":"2025-05-04T08:28:14.303Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T08:28:14.303Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: phy: fix null-ptr-deref while probe() failed\n\nI got a null-ptr-deref report as following when doing fault injection test:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000058\nOops: 0000 [#1] PREEMPT SMP KASAN PTI\nCPU: 1 PID: 253 Comm: 507-spi-dm9051 Tainted: G    B            N 6.1.0-rc3+\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014\nRIP: 0010:klist_put+0x2d/0xd0\nCall Trace:\n <TASK>\n klist_remove+0xf1/0x1c0\n device_release_driver_internal+0x23e/0x2d0\n bus_remove_device+0x1bd/0x240\n device_del+0x357/0x770\n phy_device_remove+0x11/0x30\n mdiobus_unregister+0xa5/0x140\n release_nodes+0x6a/0xa0\n devres_release_all+0xf8/0x150\n device_unbind_cleanup+0x19/0xd0\n\n//probe path:\nphy_device_register()\n  device_add()\n\nphy_connect\n  phy_attach_direct() //set device driver\n    probe() //it's failed, driver is not bound\n    device_bind_driver() // probe failed, it's not called\n\n//remove path:\nphy_device_remove()\n  device_del()\n    device_release_driver_internal()\n      __device_release_driver() //dev->drv is not NULL\n        klist_remove() <- knode_driver is not added yet, cause null-ptr-deref\n\nIn phy_attach_direct(), after setting the 'dev->driver', probe() fails,\ndevice_bind_driver() is not called, so the knode_driver->n_klist is not\nset, then it causes null-ptr-deref in __device_release_driver() while\ndeleting device. Fix this by setting dev->driver to NULL in the error\npath in phy_attach_direct()."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/phy/phy_device.c"],"versions":[{"version":"e13934563db047043ccead26412f552375cea90c","lessThan":"8aaafe0f71314f46a066382a047ba8bb3840d273","status":"affected","versionType":"git"},{"version":"e13934563db047043ccead26412f552375cea90c","lessThan":"51d7f6b20fae8bae64ad1136f1e30d1fd5ba78f7","status":"affected","versionType":"git"},{"version":"e13934563db047043ccead26412f552375cea90c","lessThan":"0744c7be4de564db03e24527b2e096b7e0e20972","status":"affected","versionType":"git"},{"version":"e13934563db047043ccead26412f552375cea90c","lessThan":"3e21f85d87c836462bb52ef2078ea561260935c1","status":"affected","versionType":"git"},{"version":"e13934563db047043ccead26412f552375cea90c","lessThan":"fe6bc99c27c21348f548966118867ed26a9a372c","status":"affected","versionType":"git"},{"version":"e13934563db047043ccead26412f552375cea90c","lessThan":"7730904f50c7187dd16c76949efb56b5fb55cd57","status":"affected","versionType":"git"},{"version":"e13934563db047043ccead26412f552375cea90c","lessThan":"eaa5722549ac2604ffa56c2e946acc83226f130c","status":"affected","versionType":"git"},{"version":"e13934563db047043ccead26412f552375cea90c","lessThan":"369eb2c9f1f72adbe91e0ea8efb130f0a2ba11a6","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/phy/phy_device.c"],"versions":[{"version":"2.6.14","status":"affected"},{"version":"0","lessThan":"2.6.14","status":"unaffected","versionType":"semver"},{"version":"4.9.335","lessThanOrEqual":"4.9.*","status":"unaffected","versionType":"semver"},{"version":"4.14.301","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.268","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.226","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.158","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.82","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.0.12","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.14","versionEndExcluding":"4.9.335"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.14","versionEndExcluding":"4.14.301"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.14","versionEndExcluding":"4.19.268"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.14","versionEndExcluding":"5.4.226"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.14","versionEndExcluding":"5.10.158"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.14","versionEndExcluding":"5.15.82"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.14","versionEndExcluding":"6.0.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.14","versionEndExcluding":"6.1"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/8aaafe0f71314f46a066382a047ba8bb3840d273"},{"url":"https://git.kernel.org/stable/c/51d7f6b20fae8bae64ad1136f1e30d1fd5ba78f7"},{"url":"https://git.kernel.org/stable/c/0744c7be4de564db03e24527b2e096b7e0e20972"},{"url":"https://git.kernel.org/stable/c/3e21f85d87c836462bb52ef2078ea561260935c1"},{"url":"https://git.kernel.org/stable/c/fe6bc99c27c21348f548966118867ed26a9a372c"},{"url":"https://git.kernel.org/stable/c/7730904f50c7187dd16c76949efb56b5fb55cd57"},{"url":"https://git.kernel.org/stable/c/eaa5722549ac2604ffa56c2e946acc83226f130c"},{"url":"https://git.kernel.org/stable/c/369eb2c9f1f72adbe91e0ea8efb130f0a2ba11a6"}],"title":"net: phy: fix null-ptr-deref while probe() failed","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2022-49021","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-10-22T13:12:34.199961Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-22T13:18:37.179Z"}}]}}