We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49905

net/smc: Fix possible leaked pernet namespace in smc_init()



Description

In the Linux kernel, the following vulnerability has been resolved: net/smc: Fix possible leaked pernet namespace in smc_init() In smc_init(), register_pernet_subsys(&smc_net_stat_ops) is called without any error handling. If it fails, registering of &smc_net_ops won't be reverted. And if smc_nl_init() fails, &smc_net_stat_ops itself won't be reverted. This leaves wild ops in subsystem linkedlist and when another module tries to call register_pernet_operations() it triggers page fault: BUG: unable to handle page fault for address: fffffbfff81b964c RIP: 0010:register_pernet_operations+0x1b9/0x5f0 Call Trace: <TASK> register_pernet_subsys+0x29/0x40 ebtables_init+0x58/0x1000 [ebtables] ...

Reserved 2025-05-01 | Published 2025-05-01 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

194730a9beb52d2b030ea45e12d94868d4a0e6fd before 61defd6450a9ef4a1487090449999b0fd83518ef
affected

194730a9beb52d2b030ea45e12d94868d4a0e6fd before c97daf836f7caf81d3144b8cd2b2a51f9bc3bd09
affected

194730a9beb52d2b030ea45e12d94868d4a0e6fd before 62ff373da2534534c55debe6c724c7fe14adb97f
affected

Default status
affected

5.14
affected

Any version before 5.14
unaffected

5.15.78
unaffected

6.0.8
unaffected

6.1
unaffected

References

git.kernel.org/...c/61defd6450a9ef4a1487090449999b0fd83518ef

git.kernel.org/...c/c97daf836f7caf81d3144b8cd2b2a51f9bc3bd09

git.kernel.org/...c/62ff373da2534534c55debe6c724c7fe14adb97f

cve.org (CVE-2022-49905)

nvd.nist.gov (CVE-2022-49905)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49905

Support options

Helpdesk Chat, Email, Knowledgebase