
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel's IPVS (IP Virtual Server) module has been identified as CVE-2022-49917. During the initialization of ip_vs_app_net_init(), if the ip_vs_app file fails to be created, the initialization is still marked as successful by default. This leads to a situation where the ip_vs_app file cannot be found during removal in ip_vs_app_net_cleanup(), resulting in a WARNING condition (NVD Database).
The vulnerability manifests in the Linux kernel's IPVS module, specifically during the cleanup process. When ip_vs_app_net_cleanup() is called, it attempts to remove a file that was never successfully created during initialization, triggering a kernel warning. The issue occurs at fs/proc/generic.c:712 in the remove_proc_entry function. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 with attack vector being Local (Red Hat CVE).
The impact of this vulnerability appears to be limited to generating kernel warnings rather than causing system crashes or enabling privilege escalation. While it represents a flaw in the kernel's error handling, the primary effect is diagnostic in nature (Wiz Database).
Red Hat has marked this vulnerability as 'Fix deferred' for Red Hat Enterprise Linux 9 and kernel-rt packages. Users of affected systems should monitor vendor announcements for available patches (Red Hat CVE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."