Description
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-54502 | This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
References
History
Thu, 27 Feb 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | kernel: xen: unexport __init-annotated xen_xlate_map_ballooned_pages() | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 26 Feb 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: xen: unexport __init-annotated xen_xlate_map_ballooned_pages() EXPORT_SYMBOL and __init is a bad combination because the .init.text section is freed up after the initialization. Hence, modules cannot use symbols annotated __init. The access to a freed symbol may end up with kernel panic. modpost used to detect it, but it has been broken for a decade. Recently, I fixed modpost so it started to warn it again, then this showed up in linux-next builds. There are two ways to fix it: - Remove __init - Remove EXPORT_SYMBOL I chose the latter for this case because none of the in-tree call-sites (arch/arm/xen/enlighten.c, arch/x86/xen/grant-table.c) is compiled as modular. | This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
| Title | xen: unexport __init-annotated xen_xlate_map_ballooned_pages() | |
| References |
|
|
Wed, 26 Feb 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: xen: unexport __init-annotated xen_xlate_map_ballooned_pages() EXPORT_SYMBOL and __init is a bad combination because the .init.text section is freed up after the initialization. Hence, modules cannot use symbols annotated __init. The access to a freed symbol may end up with kernel panic. modpost used to detect it, but it has been broken for a decade. Recently, I fixed modpost so it started to warn it again, then this showed up in linux-next builds. There are two ways to fix it: - Remove __init - Remove EXPORT_SYMBOL I chose the latter for this case because none of the in-tree call-sites (arch/arm/xen/enlighten.c, arch/x86/xen/grant-table.c) is compiled as modular. | |
| Title | xen: unexport __init-annotated xen_xlate_map_ballooned_pages() | |
| References |
|
|
Subscriptions
No data.
Status: REJECTED
Assigner: Linux
Published:
Updated: 2025-02-26T11:29:30.958Z
Reserved: 2025-02-26T02:08:31.545Z
Link: CVE-2022-49355
No data.
Status : Rejected
Published: 2025-02-26T07:01:12.200
Modified: 2025-02-26T13:15:34.157
Link: CVE-2022-49355
OpenCVE Enrichment
No data.
Weaknesses
No weakness.
EUVD