CVE-2022-49903

In the Linux kernel, the following vulnerability has been resolved: ipv6: fix WARNING in ip6_route_net_exit_late() During the initialization of ip6_route_net_init_late(), if file ipv6_route or rt6_stats fails to be created, the initialization is successful by default. Therefore, the ipv6_route or rt6_stats file doesn't be found during the remove in ip6_route_net_exit_late(). It will cause WRNING. The following is the stack information: name 'rt6_stats' WARNING: CPU: 0 PID: 9 at fs/proc/generic.c:712 remove_proc_entry+0x389/0x460 Modules linked in: Workqueue: netns cleanup_net RIP: 0010:remove_proc_entry+0x389/0x460 PKRU: 55555554 Call Trace: <TASK> ops_exit_list+0xb0/0x170 cleanup_net+0x4ea/0xb00 process_one_work+0x9bf/0x1710 worker_thread+0x665/0x1080 kthread+0x2e4/0x3a0 ret_from_fork+0x1f/0x30 </TASK>
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*

History

11 Nov 2025, 01:45

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/080589287127838046077904f34d5054ea0f895c - () https://git.kernel.org/stable/c/080589287127838046077904f34d5054ea0f895c - Patch
References () https://git.kernel.org/stable/c/0ed71af4d017d2bd2cbb8f7254f613a4914def26 - () https://git.kernel.org/stable/c/0ed71af4d017d2bd2cbb8f7254f613a4914def26 - Patch
References () https://git.kernel.org/stable/c/381453770f731f0f43616a1cd4c759b7807a1517 - () https://git.kernel.org/stable/c/381453770f731f0f43616a1cd4c759b7807a1517 - Patch
References () https://git.kernel.org/stable/c/5dbb47ee89762da433cd8458788d7640c85f1a07 - () https://git.kernel.org/stable/c/5dbb47ee89762da433cd8458788d7640c85f1a07 - Patch
References () https://git.kernel.org/stable/c/768b3c745fe5789f2430bdab02f35a9ad1148d97 - () https://git.kernel.org/stable/c/768b3c745fe5789f2430bdab02f35a9ad1148d97 - Patch
References () https://git.kernel.org/stable/c/83fbf246ced54dadd7b9adc2a16efeff30ba944d - () https://git.kernel.org/stable/c/83fbf246ced54dadd7b9adc2a16efeff30ba944d - Patch

02 May 2025, 13:52

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv6: corrección de una advertencia en ip6_route_net_exit_late(). Durante la inicialización de ip6_route_net_init_late(), si no se crea el archivo ipv6_route o rt6_stats, la inicialización se realiza correctamente por defecto. Por lo tanto, no se encuentra el archivo ipv6_route o rt6_stats durante la eliminación en ip6_route_net_exit_late(). Esto provocará una advertencia. La siguiente es la información de la pila: nombre 'rt6_stats' ADVERTENCIA: CPU: 0 PID: 9 en fs/proc/generic.c:712 remove_proc_entry+0x389/0x460 Módulos vinculados: Cola de trabajo: netns cleanup_net RIP: 0010:remove_proc_entry+0x389/0x460 PKRU: 55555554 Seguimiento de llamadas: ops_exit_list+0xb0/0x170 cleanup_net+0x4ea/0xb00 process_one_work+0x9bf/0x1710 workers_thread+0x665/0x1080 kthread+0x2e4/0x3a0 ret_from_fork+0x1f/0x30

01 May 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 15:16

Updated : 2025-11-11 01:45


NVD link : CVE-2022-49903

Mitre link : CVE-2022-49903

CVE.ORG link : CVE-2022-49903


JSON object : View

Products Affected

linux

  • linux_kernel