Metrics
Affected Vendors & Products
Wed, 18 Jun 2025 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Sat, 07 Jun 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 02 May 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 01 May 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: net/smc: Fix possible leaked pernet namespace in smc_init() In smc_init(), register_pernet_subsys(&smc_net_stat_ops) is called without any error handling. If it fails, registering of &smc_net_ops won't be reverted. And if smc_nl_init() fails, &smc_net_stat_ops itself won't be reverted. This leaves wild ops in subsystem linkedlist and when another module tries to call register_pernet_operations() it triggers page fault: BUG: unable to handle page fault for address: fffffbfff81b964c RIP: 0010:register_pernet_operations+0x1b9/0x5f0 Call Trace: <TASK> register_pernet_subsys+0x29/0x40 ebtables_init+0x58/0x1000 [ebtables] ... | |
Title | net/smc: Fix possible leaked pernet namespace in smc_init() | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-05-01T14:10:49.621Z
Updated: 2025-05-04T08:48:22.654Z
Reserved: 2025-05-01T14:05:17.246Z
Link: CVE-2022-49905

No data.

Status : Awaiting Analysis
Published: 2025-05-01T15:16:15.593
Modified: 2025-05-02T13:52:51.693
Link: CVE-2022-49905
