We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49904

net, neigh: Fix null-ptr-deref in neigh_table_clear()



Description

In the Linux kernel, the following vulnerability has been resolved: net, neigh: Fix null-ptr-deref in neigh_table_clear() When IPv6 module gets initialized but hits an error in the middle, kenel panic with: KASAN: null-ptr-deref in range [0x0000000000000598-0x000000000000059f] CPU: 1 PID: 361 Comm: insmod Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) RIP: 0010:__neigh_ifdown.isra.0+0x24b/0x370 RSP: 0018:ffff888012677908 EFLAGS: 00000202 ... Call Trace: <TASK> neigh_table_clear+0x94/0x2d0 ndisc_cleanup+0x27/0x40 [ipv6] inet6_init+0x21c/0x2cb [ipv6] do_one_initcall+0xd3/0x4d0 do_init_module+0x1ae/0x670 ... Kernel panic - not syncing: Fatal exception When ipv6 initialization fails, it will try to cleanup and calls: neigh_table_clear() neigh_ifdown(tbl, NULL) pneigh_queue_purge(&tbl->proxy_queue, dev_net(dev == NULL)) # dev_net(NULL) triggers null-ptr-deref. Fix it by passing NULL to pneigh_queue_purge() in neigh_ifdown() if dev is NULL, to make kernel not panic immediately.

Reserved 2025-05-01 | Published 2025-05-01 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

9bbaed571c4bf1b62ac8703cb359dc090efc3455 before 0d38b4ca6679e72860ff8730e79bb99d0e9fa3b0
affected

05fdce1ae744dee43c9181fd063c9c0db4f777f2 before b736592de2aa53aee2d48d6b129bc0c892007bbe
affected

51be9dd391fd25872b95708a0250f2f7722d2d8e before b49f6b2f21f543d4dc88fb7b1ec2adccb822f27c
affected

c35adafe42bd6c3bf2aca0a3f523dabc38fc23c8 before 1c89642e7f2b7ecc9635610653f5c2f0276c0051
affected

db6fa03d80ab076238fc806c9925d1f8b9639d1b before 2b45d6d0c41cb9593868e476681efb1aae5078a1
affected

66ba215cb51323e4e55e38fd5f250e0fae0cbc94 before a99a8ec4c62180c889482a2ff6465033e0743458
affected

66ba215cb51323e4e55e38fd5f250e0fae0cbc94 before f8017317cb0b279b8ab98b0f3901a2e0ac880dad
affected

2dd5ed474115150d8175825bc3b56c6385c3a83b
affected

Default status
affected

6.0
affected

Any version before 6.0
unaffected

4.14.299
unaffected

4.19.265
unaffected

5.4.224
unaffected

5.10.154
unaffected

5.15.78
unaffected

6.0.8
unaffected

6.1
unaffected

References

git.kernel.org/...c/0d38b4ca6679e72860ff8730e79bb99d0e9fa3b0

git.kernel.org/...c/b736592de2aa53aee2d48d6b129bc0c892007bbe

git.kernel.org/...c/b49f6b2f21f543d4dc88fb7b1ec2adccb822f27c

git.kernel.org/...c/1c89642e7f2b7ecc9635610653f5c2f0276c0051

git.kernel.org/...c/2b45d6d0c41cb9593868e476681efb1aae5078a1

git.kernel.org/...c/a99a8ec4c62180c889482a2ff6465033e0743458

git.kernel.org/...c/f8017317cb0b279b8ab98b0f3901a2e0ac880dad

cve.org (CVE-2022-49904)

nvd.nist.gov (CVE-2022-49904)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49904

Support options

Helpdesk Chat, Email, Knowledgebase