CVE-2022-49918

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2025
Last modified:
12/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ipvs: fix WARNING in __ip_vs_cleanup_batch()<br /> <br /> During the initialization of ip_vs_conn_net_init(), if file ip_vs_conn<br /> or ip_vs_conn_sync fails to be created, the initialization is successful<br /> by default. Therefore, the ip_vs_conn or ip_vs_conn_sync file doesn&amp;#39;t<br /> be found during the remove.<br /> <br /> The following is the stack information:<br /> name &amp;#39;ip_vs_conn_sync&amp;#39;<br /> WARNING: CPU: 3 PID: 9 at fs/proc/generic.c:712<br /> remove_proc_entry+0x389/0x460<br /> Modules linked in:<br /> Workqueue: netns cleanup_net<br /> RIP: 0010:remove_proc_entry+0x389/0x460<br /> Call Trace:<br /> <br /> __ip_vs_cleanup_batch+0x7d/0x120<br /> ops_exit_list+0x125/0x170<br /> cleanup_net+0x4ea/0xb00<br /> process_one_work+0x9bf/0x1710<br /> worker_thread+0x665/0x1080<br /> kthread+0x2e4/0x3a0<br /> ret_from_fork+0x1f/0x30<br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 2.6.39 (including) 4.19.265 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.224 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.154 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.78 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.0.8 (excluding)
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*