Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix PCI device refcount leak in has_external_pci() for_each_pci_dev() is implemented by pci_get_device(). The comment of pci_get_device() says that it will increase the reference count for the returned pci_dev and also decrease the reference count for the input pci_dev @from if it is not NULL. If we break for_each_pci_dev() loop with pdev not NULL, we need to call pci_dev_put() to decrease the reference count. Add the missing pci_dev_put() before 'return true' to avoid reference count leak.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.0, < 5.10.158 |
References
- https://git.kernel.org/stable/c/10ed7655a17f6a3eaecd1293830488259ccd5723Patch
- https://git.kernel.org/stable/c/17f67414718e6aba123335a33b7d15aa594fff34Patch
- https://git.kernel.org/stable/c/afca9e19cc720bfafc75dc5ce429c185ca93f31dPatch
- https://git.kernel.org/stable/c/b6eea8b2e858a20ad58ac62dc2de90fea2413f94Patch
FAQ
What is CVE-2022-49000?
CVE-2022-49000 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix PCI device refcount leak in has_external_pci() for_each_pci_dev() is implemented by pci_get_device(). The comment ...
How severe is CVE-2022-49000?
CVE-2022-49000 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49000?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.