Description
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Published: 2025-02-26
Score: 5.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-54502 This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
History

Thu, 27 Feb 2025 01:45:00 +0000

Type Values Removed Values Added
Title kernel: xen: unexport __init-annotated xen_xlate_map_ballooned_pages()
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Wed, 26 Feb 2025 11:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: xen: unexport __init-annotated xen_xlate_map_ballooned_pages() EXPORT_SYMBOL and __init is a bad combination because the .init.text section is freed up after the initialization. Hence, modules cannot use symbols annotated __init. The access to a freed symbol may end up with kernel panic. modpost used to detect it, but it has been broken for a decade. Recently, I fixed modpost so it started to warn it again, then this showed up in linux-next builds. There are two ways to fix it: - Remove __init - Remove EXPORT_SYMBOL I chose the latter for this case because none of the in-tree call-sites (arch/arm/xen/enlighten.c, arch/x86/xen/grant-table.c) is compiled as modular. This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Title xen: unexport __init-annotated xen_xlate_map_ballooned_pages()
References

Wed, 26 Feb 2025 02:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: xen: unexport __init-annotated xen_xlate_map_ballooned_pages() EXPORT_SYMBOL and __init is a bad combination because the .init.text section is freed up after the initialization. Hence, modules cannot use symbols annotated __init. The access to a freed symbol may end up with kernel panic. modpost used to detect it, but it has been broken for a decade. Recently, I fixed modpost so it started to warn it again, then this showed up in linux-next builds. There are two ways to fix it: - Remove __init - Remove EXPORT_SYMBOL I chose the latter for this case because none of the in-tree call-sites (arch/arm/xen/enlighten.c, arch/x86/xen/grant-table.c) is compiled as modular.
Title xen: unexport __init-annotated xen_xlate_map_ballooned_pages()
References

Subscriptions

No data.

cve-icon MITRE

Status: REJECTED

Assigner: Linux

Published:

Updated: 2025-02-26T11:29:30.958Z

Reserved: 2025-02-26T02:08:31.545Z

Link: CVE-2022-49355

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Rejected

Published: 2025-02-26T07:01:12.200

Modified: 2025-02-26T13:15:34.157

Link: CVE-2022-49355

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-02-26T00:00:00Z

Links: CVE-2022-49355 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses

No weakness.