In the Linux kernel, the following vulnerability has been resolved:
ipv6: fix WARNING in ip6routenetexitlate()
During the initialization of ip6routenetinitlate(), if file ipv6route or rt6stats fails to be created, the initialization is successful by default. Therefore, the ipv6route or rt6stats file doesn't be found during the remove in ip6routenetexitlate(). It will cause WRNING.
The following is the stack information: name 'rt6stats' WARNING: CPU: 0 PID: 9 at fs/proc/generic.c:712 removeprocentry+0x389/0x460 Modules linked in: Workqueue: netns cleanupnet RIP: 0010:removeprocentry+0x389/0x460 PKRU: 55555554 Call Trace: <TASK> opsexitlist+0xb0/0x170 cleanupnet+0x4ea/0xb00 processonework+0x9bf/0x1710 workerthread+0x665/0x1080 kthread+0x2e4/0x3a0 retfromfork+0x1f/0x30 </TASK>
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/ee626f5d79d5817bb21d6f048dc0da4c4e383443/cves/2022/49xxx/CVE-2022-49903.json"
}[
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@768b3c745fe5789f2430bdab02f35a9ad1148d97",
"id": "CVE-2022-49903-11d2040e",
"target": {
"function": "ip6_route_net_init_late",
"file": "net/ipv6/route.c"
},
"digest": {
"function_hash": "266394037536239587064014278551185826754",
"length": 261.0
},
"signature_type": "Function"
},
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@83fbf246ced54dadd7b9adc2a16efeff30ba944d",
"id": "CVE-2022-49903-15c53a3f",
"target": {
"file": "net/ipv6/route.c"
},
"digest": {
"line_hashes": [
"297487331703727095782343327584508793344",
"229827259329878287417212154423861825994",
"154935302806494946844285260768375379497",
"33022018469625715276463236067684646987",
"113312504603070732731103158613996278601",
"278558724756806658075517684360711342141",
"105192142870856292425846537044634103217"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080589287127838046077904f34d5054ea0f895c",
"id": "CVE-2022-49903-387142ba",
"target": {
"function": "ip6_route_net_init_late",
"file": "net/ipv6/route.c"
},
"digest": {
"function_hash": "266394037536239587064014278551185826754",
"length": 261.0
},
"signature_type": "Function"
},
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@080589287127838046077904f34d5054ea0f895c",
"id": "CVE-2022-49903-50a0eacf",
"target": {
"file": "net/ipv6/route.c"
},
"digest": {
"line_hashes": [
"297487331703727095782343327584508793344",
"229827259329878287417212154423861825994",
"154935302806494946844285260768375379497",
"33022018469625715276463236067684646987",
"113312504603070732731103158613996278601",
"278558724756806658075517684360711342141",
"105192142870856292425846537044634103217"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@83fbf246ced54dadd7b9adc2a16efeff30ba944d",
"id": "CVE-2022-49903-6f6f889a",
"target": {
"function": "ip6_route_net_init_late",
"file": "net/ipv6/route.c"
},
"digest": {
"function_hash": "266394037536239587064014278551185826754",
"length": 261.0
},
"signature_type": "Function"
},
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5dbb47ee89762da433cd8458788d7640c85f1a07",
"id": "CVE-2022-49903-711a1403",
"target": {
"function": "ip6_route_net_init_late",
"file": "net/ipv6/route.c"
},
"digest": {
"function_hash": "266394037536239587064014278551185826754",
"length": 261.0
},
"signature_type": "Function"
},
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@381453770f731f0f43616a1cd4c759b7807a1517",
"id": "CVE-2022-49903-ad9826a8",
"target": {
"function": "ip6_route_net_init_late",
"file": "net/ipv6/route.c"
},
"digest": {
"function_hash": "266394037536239587064014278551185826754",
"length": 261.0
},
"signature_type": "Function"
},
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@768b3c745fe5789f2430bdab02f35a9ad1148d97",
"id": "CVE-2022-49903-add73d67",
"target": {
"file": "net/ipv6/route.c"
},
"digest": {
"line_hashes": [
"297487331703727095782343327584508793344",
"229827259329878287417212154423861825994",
"154935302806494946844285260768375379497",
"33022018469625715276463236067684646987",
"113312504603070732731103158613996278601",
"278558724756806658075517684360711342141",
"105192142870856292425846537044634103217"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0ed71af4d017d2bd2cbb8f7254f613a4914def26",
"id": "CVE-2022-49903-bc96a85c",
"target": {
"function": "ip6_route_net_init_late",
"file": "net/ipv6/route.c"
},
"digest": {
"function_hash": "266394037536239587064014278551185826754",
"length": 261.0
},
"signature_type": "Function"
},
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5dbb47ee89762da433cd8458788d7640c85f1a07",
"id": "CVE-2022-49903-d52c8ac4",
"target": {
"file": "net/ipv6/route.c"
},
"digest": {
"line_hashes": [
"297487331703727095782343327584508793344",
"229827259329878287417212154423861825994",
"154935302806494946844285260768375379497",
"33022018469625715276463236067684646987",
"113312504603070732731103158613996278601",
"278558724756806658075517684360711342141",
"105192142870856292425846537044634103217"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@381453770f731f0f43616a1cd4c759b7807a1517",
"id": "CVE-2022-49903-deebd468",
"target": {
"file": "net/ipv6/route.c"
},
"digest": {
"line_hashes": [
"297487331703727095782343327584508793344",
"229827259329878287417212154423861825994",
"154935302806494946844285260768375379497",
"33022018469625715276463236067684646987",
"113312504603070732731103158613996278601",
"278558724756806658075517684360711342141",
"105192142870856292425846537044634103217"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0ed71af4d017d2bd2cbb8f7254f613a4914def26",
"id": "CVE-2022-49903-f22ad771",
"target": {
"file": "net/ipv6/route.c"
},
"digest": {
"line_hashes": [
"297487331703727095782343327584508793344",
"229827259329878287417212154423861825994",
"154935302806494946844285260768375379497",
"33022018469625715276463236067684646987",
"113312504603070732731103158613996278601",
"278558724756806658075517684360711342141",
"105192142870856292425846537044634103217"
],
"threshold": 0.9
},
"signature_type": "Line"
}
]