CVE-2022-49662

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49662
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49662.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49662
Downstream
Published
2025-02-26T02:23:58.824Z
Modified
2025-11-28T22:39:46.690008Z
Summary
ipv6: fix lockdep splat in in6_dump_addrs()
Details

In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix lockdep splat in in6dumpaddrs()

As reported by syzbot, we should not use rcudereference() when rcuread_lock() is not held.

WARNING: suspicious RCU usage 5.19.0-rc2-syzkaller #0 Not tainted

net/ipv6/addrconf.c:5175 suspicious rcudereferencecheck() usage!

other info that might help us debug this:

rcuscheduleractive = 2, debuglocks = 1 1 lock held by syz-executor326/3617: #0: ffffffff8d5848e8 (rtnlmutex){+.+.}-{3:3}, at: netlinkdump+0xae/0xc20 net/netlink/afnetlink.c:2223

stack backtrace: CPU: 0 PID: 3617 Comm: syz-executor326 Not tainted 5.19.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: <TASK> dumpstack lib/dumpstack.c:88 [inline] dumpstacklvl+0xcd/0x134 lib/dumpstack.c:106 in6dumpaddrs+0x12d1/0x1790 net/ipv6/addrconf.c:5175 inet6dumpaddr+0x9c1/0xb50 net/ipv6/addrconf.c:5300 netlinkdump+0x541/0xc20 net/netlink/afnetlink.c:2275 _netlinkdumpstart+0x647/0x900 net/netlink/afnetlink.c:2380 netlinkdumpstart include/linux/netlink.h:245 [inline] rtnetlinkrcvmsg+0x73e/0xc90 net/core/rtnetlink.c:6046 netlinkrcvskb+0x153/0x420 net/netlink/afnetlink.c:2501 netlinkunicastkernel net/netlink/afnetlink.c:1319 [inline] netlinkunicast+0x543/0x7f0 net/netlink/afnetlink.c:1345 netlinksendmsg+0x917/0xe10 net/netlink/afnetlink.c:1921 socksendmsgnosec net/socket.c:714 [inline] socksendmsg+0xcf/0x120 net/socket.c:734 syssendmsg+0x6eb/0x810 net/socket.c:2492 _syssendmsg+0xf3/0x170 net/socket.c:2546 _syssendmsg net/socket.c:2575 [inline] _dosyssendmsg net/socket.c:2584 [inline] _sesyssendmsg net/socket.c:2582 [inline] _x64syssendmsg+0x132/0x220 net/socket.c:2582 dosyscallx64 arch/x86/entry/common.c:50 [inline] dosyscall64+0x35/0xb0 arch/x86/entry/common.c:80 entrySYSCALL64after_hwframe+0x46/0xb0

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49662.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
88e2ca3080947fe22eb520c1f8231e79a105d011
Fixed
2930ee1a166df0e12fe9fec4b79cc3dc9634ae45
Fixed
b39fda51c32dd879451e0119881f31493bf83283
Fixed
4e43e64d0f1332fcc503babad4dc31aead7131ca

Affected versions

v5.*

v5.12
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.26
v5.15.27
v5.15.28
v5.15.29
v5.15.3
v5.15.30
v5.15.31
v5.15.32
v5.15.33
v5.15.34
v5.15.35
v5.15.36
v5.15.37
v5.15.38
v5.15.39
v5.15.4
v5.15.40
v5.15.41
v5.15.42
v5.15.43
v5.15.44
v5.15.45
v5.15.46
v5.15.47
v5.15.48
v5.15.49
v5.15.5
v5.15.50
v5.15.51
v5.15.52
v5.15.6
v5.15.7
v5.15.8
v5.15.9
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.18.1
v5.18.2
v5.18.3
v5.18.4
v5.18.5
v5.18.6
v5.18.7
v5.18.8
v5.18.9
v5.19-rc1
v5.19-rc2
v5.19-rc3

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.13.0
Fixed
5.15.53
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.10