Bug 2363364 (CVE-2022-49918) - CVE-2022-49918 kernel: ipvs: fix WARNING in __ip_vs_cleanup_batch()
Summary: CVE-2022-49918 kernel: ipvs: fix WARNING in __ip_vs_cleanup_batch()
Keywords:
Status: NEW
Alias: CVE-2022-49918
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-05-01 15:01 UTC by OSIDB Bzimport
Modified: 2025-06-06 00:16 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-05-01 15:01:33 UTC
In the Linux kernel, the following vulnerability has been resolved:

ipvs: fix WARNING in __ip_vs_cleanup_batch()

During the initialization of ip_vs_conn_net_init(), if file ip_vs_conn
or ip_vs_conn_sync fails to be created, the initialization is successful
by default. Therefore, the ip_vs_conn or ip_vs_conn_sync file doesn't
be found during the remove.

The following is the stack information:
name 'ip_vs_conn_sync'
WARNING: CPU: 3 PID: 9 at fs/proc/generic.c:712
remove_proc_entry+0x389/0x460
Modules linked in:
Workqueue: netns cleanup_net
RIP: 0010:remove_proc_entry+0x389/0x460
Call Trace:
<TASK>
__ip_vs_cleanup_batch+0x7d/0x120
ops_exit_list+0x125/0x170
cleanup_net+0x4ea/0xb00
process_one_work+0x9bf/0x1710
worker_thread+0x665/0x1080
kthread+0x2e4/0x3a0
ret_from_fork+0x1f/0x30
</TASK>

Comment 1 Avinash Hanwate 2025-05-02 03:56:03 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025050107-CVE-2022-49918-8541@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.