CVE-2022-49675

Source
https://cve.org/CVERecord?id=CVE-2022-49675
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49675.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49675
Downstream
Related
Published
2025-02-26T02:24:07.395Z
Modified
2026-04-11T12:44:23.283636Z
Summary
tick/nohz: unexport __init-annotated tick_nohz_full_setup()
Details

In the Linux kernel, the following vulnerability has been resolved:

tick/nohz: unexport _init-annotated ticknohzfullsetup()

EXPORT_SYMBOL and __init is a bad combination because the .init.text section is freed up after the initialization. Hence, modules cannot use symbols annotated __init. The access to a freed symbol may end up with kernel panic.

modpost used to detect it, but it had been broken for a decade.

Commit 28438794aba4 ("modpost: fix section mismatch check for exported init/exit sections") fixed it so modpost started to warn it again, then this showed up:

MODPOST vmlinux.symvers

WARNING: modpost: vmlinux.o(___ksymtabgpl+ticknohzfullsetup+0x0): Section mismatch in reference from the variable __ksymtabticknohzfullsetup to the function .init.text:ticknohzfullsetup() The symbol ticknohzfullsetup is exported and annotated __init Fix this by removing the _init annotation of ticknohzfullsetup or drop the export.

Drop the export because ticknohzfull_setup() is only called from the built-in code in kernel/sched/isolation.c.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49675.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ae9e557b5be2e285f48ee945d9c8faf75d4f6a66
Fixed
c4ff3ffe0138234774602152fe67e3a898c615c6
Fixed
f4a80ec8c51d68be4b7a7830c510f75080c5e417
Fixed
ea32b27e2f8c58c92bff5ecba7fcf64b97707089
Fixed
2390095113e98fc52fffe35c5206d30d9efe3f78

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49675.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.128
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.52
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49675.json"