Bug 2363400 (CVE-2022-49905) - CVE-2022-49905 kernel: net/smc: Fix possible leaked pernet namespace in smc_init()
Summary: CVE-2022-49905 kernel: net/smc: Fix possible leaked pernet namespace in smc_i...
Keywords:
Status: NEW
Alias: CVE-2022-49905
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-05-01 15:03 UTC by OSIDB Bzimport
Modified: 2025-06-06 00:14 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-05-01 15:03:20 UTC
In the Linux kernel, the following vulnerability has been resolved:

net/smc: Fix possible leaked pernet namespace in smc_init()

In smc_init(), register_pernet_subsys(&smc_net_stat_ops) is called
without any error handling.
If it fails, registering of &smc_net_ops won't be reverted.
And if smc_nl_init() fails, &smc_net_stat_ops itself won't be reverted.

This leaves wild ops in subsystem linkedlist and when another module
tries to call register_pernet_operations() it triggers page fault:

BUG: unable to handle page fault for address: fffffbfff81b964c
RIP: 0010:register_pernet_operations+0x1b9/0x5f0
Call Trace:
  <TASK>
  register_pernet_subsys+0x29/0x40
  ebtables_init+0x58/0x1000 [ebtables]
  ...

Comment 1 Avinash Hanwate 2025-05-02 04:31:49 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025050103-CVE-2022-49905-1a97@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.