CVE-2022-49345

Source
https://cve.org/CVERecord?id=CVE-2022-49345
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49345.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49345
Downstream
Related
Published
2025-02-26T02:11:00.976Z
Modified
2026-04-11T12:43:55.366681Z
Summary
net: xfrm: unexport __init-annotated xfrm4_protocol_init()
Details

In the Linux kernel, the following vulnerability has been resolved:

net: xfrm: unexport __init-annotated xfrm4protocolinit()

EXPORT_SYMBOL and __init is a bad combination because the .init.text section is freed up after the initialization. Hence, modules cannot use symbols annotated __init. The access to a freed symbol may end up with kernel panic.

modpost used to detect it, but it has been broken for a decade.

Recently, I fixed modpost so it started to warn it again, then this showed up in linux-next builds.

There are two ways to fix it:

  • Remove __init
  • Remove EXPORT_SYMBOL

I chose the latter for this case because the only in-tree call-site, net/ipv4/xfrm4policy.c is never compiled as modular. (CONFIGXFRM is boolean)

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49345.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2f32b51b609faea1e40bb8c5bd305f1351740936
Fixed
c58d82a1264813e69119c13e9804e2e60b664ad5
Fixed
e53cd3814504b2cadaba4d5a8a07eeea9ddacd03
Fixed
31f3c6a4dcd3260a386e62cef2d5b36e902600a1
Fixed
ef6d2354de238b065d8799c80da4be9a6af18e39
Fixed
be3884d5cd04ccd58294b83a02d70b7c5fca19d3
Fixed
85a055c03691e51499123194a14a0c249cf33227
Fixed
e04d59cfe0c0129df7aba7ef7bb17b96be2a64f2
Fixed
2b253fbc9f7b5db18d716436bdcf8ecef09fd63d
Fixed
4a388f08d8784af48f352193d2b72aaf167a57a1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49345.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.15.0
Fixed
4.9.318
Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.14.283
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.247
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.198
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.122
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.47
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.17.15
Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.18.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49345.json"