CVE-2022-49339: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: ipv6: unexport __init-annotated seg6_hmac_init() EXPORT_SYMBOL and __init is a bad combination because the .init.text section is freed up after the initialization. Hence, modules cannot use symbols annotated __init. The access to a freed symbol may end up with kernel panic. modpost used to detect it, but it has been broken for a decade. Recently, I fixed modpost so it started to warn it again, then this showed up in linux-next builds. There are two ways to fix it: - Remove __init - Remove EXPORT_SYMBOL I chose the latter for this case because the caller (net/ipv6/seg6.c) and the callee (net/ipv6/seg6_hmac.c) belong to the same module. It seems an internal function call in ipv6.ko.
AI Analysis
Technical Summary
CVE-2022-49339 is a vulnerability identified in the Linux kernel related to improper handling of kernel symbols annotated with __init and exported via EXPORT_SYMBOL. Specifically, the issue arises in the IPv6 segment routing (seg6) subsystem, where the function seg6_hmac_init() was marked with the __init annotation and simultaneously exported using EXPORT_SYMBOL. The __init annotation indicates that the function resides in the .init.text section, which is freed after kernel initialization to reclaim memory. Exporting such a symbol allows kernel modules to reference a function that may no longer exist in memory, leading to use-after-free conditions. This can cause kernel panics or system crashes when modules attempt to invoke these freed symbols. The root cause is a longstanding flaw in the modpost tool, which failed to detect this improper combination for over a decade. The recent fix involved removing the EXPORT_SYMBOL annotation from seg6_hmac_init(), as both the caller and callee reside within the same kernel module (ipv6.ko), making the export unnecessary. This correction prevents modules from referencing freed initialization code, thereby eliminating the risk of kernel panics due to this specific issue. No known exploits are currently reported in the wild, and the vulnerability affects specific Linux kernel versions identified by commit hashes. The vulnerability is internal to the kernel's IPv6 segment routing implementation and does not directly expose user-space interfaces or require user interaction. However, it can impact system stability if triggered.
Potential Impact
For European organizations relying on Linux-based systems, particularly those utilizing IPv6 segment routing features, this vulnerability poses a risk of kernel panics and system instability. Such disruptions can affect critical infrastructure, data centers, cloud services, and enterprise servers running vulnerable kernel versions. The impact primarily concerns availability, as kernel panics lead to system crashes and potential downtime. Confidentiality and integrity impacts are minimal since the vulnerability does not provide direct unauthorized access or privilege escalation. However, unplanned outages can indirectly affect business operations, service availability, and compliance with uptime requirements. Organizations deploying Linux in network infrastructure, telecommunications, or cloud environments that leverage IPv6 segment routing should be particularly attentive. Given the lack of known exploits, the immediate risk is low, but the potential for denial-of-service conditions warrants prompt remediation to maintain operational stability.
Mitigation Recommendations
European organizations should apply the official Linux kernel patches that remove the EXPORT_SYMBOL annotation from the __init-annotated seg6_hmac_init() function. Since this fix is integrated into the kernel source, updating to the latest stable kernel version that includes this correction is the most effective mitigation. For environments where immediate kernel upgrades are challenging, organizations should audit their use of IPv6 segment routing features and consider disabling or limiting these features temporarily to reduce exposure. Additionally, monitoring system logs for kernel panics or unusual crashes related to IPv6 modules can help detect attempts to trigger this issue. Kernel module developers and maintainers should ensure that no other __init-annotated functions are exported, preventing similar vulnerabilities. Implementing rigorous code review and automated checks for __init and EXPORT_SYMBOL misuse can further reduce risk. Finally, maintaining robust backup and recovery procedures will minimize operational impact in case of system crashes.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Denmark, Belgium, Italy
CVE-2022-49339: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: ipv6: unexport __init-annotated seg6_hmac_init() EXPORT_SYMBOL and __init is a bad combination because the .init.text section is freed up after the initialization. Hence, modules cannot use symbols annotated __init. The access to a freed symbol may end up with kernel panic. modpost used to detect it, but it has been broken for a decade. Recently, I fixed modpost so it started to warn it again, then this showed up in linux-next builds. There are two ways to fix it: - Remove __init - Remove EXPORT_SYMBOL I chose the latter for this case because the caller (net/ipv6/seg6.c) and the callee (net/ipv6/seg6_hmac.c) belong to the same module. It seems an internal function call in ipv6.ko.
AI-Powered Analysis
Technical Analysis
CVE-2022-49339 is a vulnerability identified in the Linux kernel related to improper handling of kernel symbols annotated with __init and exported via EXPORT_SYMBOL. Specifically, the issue arises in the IPv6 segment routing (seg6) subsystem, where the function seg6_hmac_init() was marked with the __init annotation and simultaneously exported using EXPORT_SYMBOL. The __init annotation indicates that the function resides in the .init.text section, which is freed after kernel initialization to reclaim memory. Exporting such a symbol allows kernel modules to reference a function that may no longer exist in memory, leading to use-after-free conditions. This can cause kernel panics or system crashes when modules attempt to invoke these freed symbols. The root cause is a longstanding flaw in the modpost tool, which failed to detect this improper combination for over a decade. The recent fix involved removing the EXPORT_SYMBOL annotation from seg6_hmac_init(), as both the caller and callee reside within the same kernel module (ipv6.ko), making the export unnecessary. This correction prevents modules from referencing freed initialization code, thereby eliminating the risk of kernel panics due to this specific issue. No known exploits are currently reported in the wild, and the vulnerability affects specific Linux kernel versions identified by commit hashes. The vulnerability is internal to the kernel's IPv6 segment routing implementation and does not directly expose user-space interfaces or require user interaction. However, it can impact system stability if triggered.
Potential Impact
For European organizations relying on Linux-based systems, particularly those utilizing IPv6 segment routing features, this vulnerability poses a risk of kernel panics and system instability. Such disruptions can affect critical infrastructure, data centers, cloud services, and enterprise servers running vulnerable kernel versions. The impact primarily concerns availability, as kernel panics lead to system crashes and potential downtime. Confidentiality and integrity impacts are minimal since the vulnerability does not provide direct unauthorized access or privilege escalation. However, unplanned outages can indirectly affect business operations, service availability, and compliance with uptime requirements. Organizations deploying Linux in network infrastructure, telecommunications, or cloud environments that leverage IPv6 segment routing should be particularly attentive. Given the lack of known exploits, the immediate risk is low, but the potential for denial-of-service conditions warrants prompt remediation to maintain operational stability.
Mitigation Recommendations
European organizations should apply the official Linux kernel patches that remove the EXPORT_SYMBOL annotation from the __init-annotated seg6_hmac_init() function. Since this fix is integrated into the kernel source, updating to the latest stable kernel version that includes this correction is the most effective mitigation. For environments where immediate kernel upgrades are challenging, organizations should audit their use of IPv6 segment routing features and consider disabling or limiting these features temporarily to reduce exposure. Additionally, monitoring system logs for kernel panics or unusual crashes related to IPv6 modules can help detect attempts to trigger this issue. Kernel module developers and maintainers should ensure that no other __init-annotated functions are exported, preventing similar vulnerabilities. Implementing rigorous code review and automated checks for __init and EXPORT_SYMBOL misuse can further reduce risk. Finally, maintaining robust backup and recovery procedures will minimize operational impact in case of system crashes.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.541Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe56fc
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 5:58:25 AM
Last updated: 8/16/2025, 5:58:01 PM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.