In the Linux kernel, the following vulnerability has been resolved:
net/smc: Fix possible leaked pernet namespace in smc_init()
In smcinit(), registerpernetsubsys(&smcnetstatops) is called without any error handling. If it fails, registering of &smcnetops won't be reverted. And if smcnlinit() fails, &smcnetstat_ops itself won't be reverted.
This leaves wild ops in subsystem linkedlist and when another module tries to call registerpernetoperations() it triggers page fault:
BUG: unable to handle page fault for address: fffffbfff81b964c RIP: 0010:registerpernetoperations+0x1b9/0x5f0 Call Trace: <TASK> registerpernetsubsys+0x29/0x40 ebtables_init+0x58/0x1000 [ebtables] ...
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@62ff373da2534534c55debe6c724c7fe14adb97f",
"target": {
"file": "net/smc/af_smc.c"
},
"deprecated": false,
"id": "CVE-2022-49905-1aee9315",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"129223025769782336853657977261032791868",
"138714849107663916731351984839038851754",
"136922548706705751845054786430228952868",
"194813047646135993919000122281700450164",
"246677937347960490984557094119940857795",
"213378583678425321441292608481534829912",
"193188591919883075205489531869669619589",
"222621545469746735636311384187289404113",
"170550862088691802913931719166303910275",
"209885501315220854320621224171378637777",
"232495805371079695890656972602176944465",
"18215128056591399512241245587023633244",
"330228063884271330640844962420379337866"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@61defd6450a9ef4a1487090449999b0fd83518ef",
"target": {
"file": "net/smc/af_smc.c"
},
"deprecated": false,
"id": "CVE-2022-49905-358deeff",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"129223025769782336853657977261032791868",
"138714849107663916731351984839038851754",
"136922548706705751845054786430228952868",
"194813047646135993919000122281700450164",
"246677937347960490984557094119940857795",
"213378583678425321441292608481534829912",
"193188591919883075205489531869669619589",
"222621545469746735636311384187289404113",
"170550862088691802913931719166303910275",
"209885501315220854320621224171378637777",
"232495805371079695890656972602176944465",
"18215128056591399512241245587023633244",
"330228063884271330640844962420379337866"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@61defd6450a9ef4a1487090449999b0fd83518ef",
"target": {
"function": "smc_init",
"file": "net/smc/af_smc.c"
},
"deprecated": false,
"id": "CVE-2022-49905-6a005e93",
"signature_version": "v1",
"digest": {
"length": 1864.0,
"function_hash": "161468132046050096700620068896549079490"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c97daf836f7caf81d3144b8cd2b2a51f9bc3bd09",
"target": {
"file": "net/smc/af_smc.c"
},
"deprecated": false,
"id": "CVE-2022-49905-ac1b9d6d",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"129223025769782336853657977261032791868",
"138714849107663916731351984839038851754",
"136922548706705751845054786430228952868",
"194813047646135993919000122281700450164",
"246677937347960490984557094119940857795",
"213378583678425321441292608481534829912",
"193188591919883075205489531869669619589",
"222621545469746735636311384187289404113",
"170550862088691802913931719166303910275",
"209885501315220854320621224171378637777",
"232495805371079695890656972602176944465",
"18215128056591399512241245587023633244",
"330228063884271330640844962420379337866"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@62ff373da2534534c55debe6c724c7fe14adb97f",
"target": {
"function": "smc_init",
"file": "net/smc/af_smc.c"
},
"deprecated": false,
"id": "CVE-2022-49905-c1469e8b",
"signature_version": "v1",
"digest": {
"length": 2179.0,
"function_hash": "152770776491197336990744154150440565531"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c97daf836f7caf81d3144b8cd2b2a51f9bc3bd09",
"target": {
"function": "smc_init",
"file": "net/smc/af_smc.c"
},
"deprecated": false,
"id": "CVE-2022-49905-e712dddd",
"signature_version": "v1",
"digest": {
"length": 2179.0,
"function_hash": "152770776491197336990744154150440565531"
},
"signature_type": "Function"
}
]