CVE-2022-49098
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
14/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Drivers: hv: vmbus: Fix potential crash on module unload<br />
<br />
The vmbus driver relies on the panic notifier infrastructure to perform<br />
some operations when a panic event is detected. Since vmbus can be built<br />
as module, it is required that the driver handles both registering and<br />
unregistering such panic notifier callback.<br />
<br />
After commit 74347a99e73a ("x86/Hyper-V: Unload vmbus channel in hv panic callback")<br />
though, the panic notifier registration is done unconditionally in the module<br />
initialization routine whereas the unregistering procedure is conditionally<br />
guarded and executes only if HV_FEATURE_GUEST_CRASH_MSR_AVAILABLE capability<br />
is set.<br />
<br />
This patch fixes that by unconditionally unregistering the panic notifier<br />
in the module&#39;s exit routine as well.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.118 (including) | 4.19.238 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.35 (including) | 5.4.189 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.6.7 (including) | 5.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.7.1 (including) | 5.10.111 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.34 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.16.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.17 (including) | 5.17.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.7:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.7:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.7:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.7:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.7:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.7:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.7:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2133c422a103cf7c7768c37b9ac382e73b691892
- https://git.kernel.org/stable/c/3d0078f8bddd58d9bb1ad40bbe929f8633abb276
- https://git.kernel.org/stable/c/5ea98d0f5f035c1bcf1517ccec0e024ae35a48b2
- https://git.kernel.org/stable/c/6b4c0149a56147b29169e07000d566162892722a
- https://git.kernel.org/stable/c/792f232d57ff28bbd5f9c4abe0466b23d5879dc8
- https://git.kernel.org/stable/c/cf580d2e3884dbafd6b90269b03a24d661578624
- https://git.kernel.org/stable/c/dcd6b1a624c0ffa21034d8b1e02e9d068458f596



