vulnerability
Ubuntu: (CVE-2022-49345): linux vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:L/AC:L/Au:S/C:C/I:N/A:C) | Feb 26, 2025 | Mar 3, 2025 | Jun 12, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
net: xfrm: unexport __init-annotated xfrm4_protocol_init()
EXPORT_SYMBOL and __init is a bad combination because the .init.text
section is freed up after the initialization. Hence, modules cannot
use symbols annotated __init. The access to a freed symbol may end up
with kernel panic.
modpost used to detect it, but it has been broken for a decade.
Recently, I fixed modpost so it started to warn it again, then this
showed up in linux-next builds.
There are two ways to fix it:
- Remove __init
- Remove EXPORT_SYMBOL
I chose the latter for this case because the only in-tree call-site,
net/ipv4/xfrm4_policy.c is never compiled as modular.
(CONFIG_XFRM is boolean)
Solution(s)
References
- CVE-2022-49345
- https://attackerkb.com/topics/CVE-2022-49345
- URL-https://git.kernel.org/linus/4a388f08d8784af48f352193d2b72aaf167a57a1
- URL-https://git.kernel.org/stable/c/2b253fbc9f7b5db18d716436bdcf8ecef09fd63d
- URL-https://git.kernel.org/stable/c/31f3c6a4dcd3260a386e62cef2d5b36e902600a1
- URL-https://git.kernel.org/stable/c/4a388f08d8784af48f352193d2b72aaf167a57a1
- URL-https://git.kernel.org/stable/c/85a055c03691e51499123194a14a0c249cf33227
- URL-https://git.kernel.org/stable/c/be3884d5cd04ccd58294b83a02d70b7c5fca19d3
- URL-https://git.kernel.org/stable/c/c58d82a1264813e69119c13e9804e2e60b664ad5
- URL-https://git.kernel.org/stable/c/e04d59cfe0c0129df7aba7ef7bb17b96be2a64f2
- URL-https://git.kernel.org/stable/c/e53cd3814504b2cadaba4d5a8a07eeea9ddacd03
- URL-https://git.kernel.org/stable/c/ef6d2354de238b065d8799c80da4be9a6af18e39
- URL-https://www.cve.org/CVERecord?id=CVE-2022-49345

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.