CVE-2022-49472

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's Micrel PHY driver allows local attackers to cause a kernel panic (denial of service) by triggering specific conditions during device probing. This affects systems using affected Linux kernel versions with Micrel PHY hardware. The vulnerability requires local access to the system.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected kernel versions not specified in CVE, but patches available for multiple stable branches
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Micrel PHY hardware and using the vulnerable driver code path.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially disrupting critical services.

🟠

Likely Case

System crash requiring reboot, causing temporary service disruption.

🟢

If Mitigated

Minimal impact with proper access controls preventing local attackers from triggering the vulnerability.

🌐 Internet-Facing: LOW - Requires local access to exploit, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local attackers or malicious insiders could cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger specific PHY device probing conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple stable kernel versions with commits: 143878e18001c5a61fcc7ae5c5240323753bb641, 1e5fbfc2a6f384e3195446c14bbd3bc298eb88c2, 660dfa033ccc9afb032015b6dc76e846bba42cfb, 7dcb404662839a4ed1a9703658fee979eb894ca4, 91e720b32cba25fa58eaa4c88fe957009cffe9f3

Vendor Advisory: https://git.kernel.org/stable/c/

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution's repository. 2. Rebuild kernel if using custom kernel. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Restrict local access

linux

Limit local user access to systems with Micrel PHY hardware

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local users from accessing systems
  • Monitor for kernel panic events and implement redundancy for critical services

🔍 How to Verify

Check if Vulnerable:

Check kernel version and verify if Micrel PHY driver is loaded: lsmod | grep phy_micrel

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated beyond patched commits and check dmesg for kernel stability

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in dmesg or system logs
  • NULL pointer dereference errors in kernel logs

Network Indicators:

  • Sudden loss of network connectivity on affected interfaces

SIEM Query:

source="kernel" AND ("NULL pointer dereference" OR "kernel panic" OR "Oops")

🔗 References

📤 Share & Export