Skip to main content

CVE-2022-49905: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49905cvecve-2022-49905
Published: Thu May 01 2025 (05/01/2025, 14:10:49 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net/smc: Fix possible leaked pernet namespace in smc_init() In smc_init(), register_pernet_subsys(&smc_net_stat_ops) is called without any error handling. If it fails, registering of &smc_net_ops won't be reverted. And if smc_nl_init() fails, &smc_net_stat_ops itself won't be reverted. This leaves wild ops in subsystem linkedlist and when another module tries to call register_pernet_operations() it triggers page fault: BUG: unable to handle page fault for address: fffffbfff81b964c RIP: 0010:register_pernet_operations+0x1b9/0x5f0 Call Trace: <TASK> register_pernet_subsys+0x29/0x40 ebtables_init+0x58/0x1000 [ebtables] ...

AI-Powered Analysis

AILast updated: 06/29/2025, 20:26:51 UTC

Technical Analysis

CVE-2022-49905 is a vulnerability identified in the Linux kernel, specifically within the SMC (Shared Memory Communications) subsystem initialization code. The flaw arises in the smc_init() function where the call to register_pernet_subsys(&smc_net_stat_ops) lacks proper error handling. If this registration fails, the subsequent cleanup steps do not revert the registration of &smc_net_ops, and if smc_nl_init() also fails, the &smc_net_stat_ops subsystem remains registered improperly. This results in inconsistent state within the pernet namespace linked list, leaving 'wild' or dangling operations. When another kernel module attempts to call register_pernet_operations(), this inconsistent state can trigger a kernel page fault, leading to a BUG report and potential kernel crash. The vulnerability is a logic error in resource management during module initialization, which can cause system instability or denial of service (DoS) due to kernel panic. Exploitation does not appear to require user interaction or authentication but would require the ability to load kernel modules or trigger the affected initialization paths. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The affected versions are specific Linux kernel commits identified by their hashes, indicating this is a recent or in-development kernel issue that has been published for awareness and patching.

Potential Impact

For European organizations, the impact of CVE-2022-49905 primarily concerns system stability and availability. Linux is widely used across European enterprises, government agencies, and critical infrastructure, especially in servers, cloud environments, and embedded systems. A kernel panic caused by this vulnerability can lead to unexpected system crashes and downtime, disrupting business operations and services. Organizations relying on Linux-based systems for critical workloads could face denial of service conditions, potentially affecting service level agreements and operational continuity. While this vulnerability does not directly expose confidentiality or integrity risks, the resulting instability could be exploited as part of a broader attack chain to cause disruption. Systems that allow untrusted users to load kernel modules or trigger the vulnerable initialization path are at higher risk. Given the pervasiveness of Linux in European IT environments, especially in sectors like finance, telecommunications, and public administration, the potential for operational impact is significant if unpatched systems are exploited or encounter this fault.

Mitigation Recommendations

To mitigate CVE-2022-49905, European organizations should: 1) Apply the latest Linux kernel updates that include the fix for this vulnerability as soon as they become available. Since the vulnerability is in kernel initialization code, patching the kernel is the primary remediation. 2) Restrict kernel module loading privileges strictly to trusted administrators to reduce the risk of triggering the vulnerable code path. 3) Implement robust monitoring of kernel logs and system stability to detect early signs of kernel faults or crashes related to this issue. 4) For environments using custom or in-development kernels, ensure thorough testing of the smc subsystem initialization and error handling paths before deployment. 5) Consider disabling the SMC subsystem if it is not required, reducing the attack surface. 6) Maintain strong change management and incident response procedures to quickly address any kernel crashes or instability potentially linked to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-01T14:05:17.246Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe3ffd

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 8:26:51 PM

Last updated: 8/17/2025, 2:46:35 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats