Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net: ena: Fix error handling in ena_init() The ena_init() won't destroy workqueue created by create_singlethread_workqueue() when pci_register_driver() failed. Call destroy_workqueue() when pci_register_driver() failed to prevent the resource leak.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.9, < 5.10.156 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/0e2369223b174d198ec42a3ec0a7f06c8727b968Patch
- https://git.kernel.org/stable/c/3f7b2ef8fe924e299bc339811ea3f1b9935c040fPatch
- https://git.kernel.org/stable/c/6b23a4b252044e4fd23438930d452244818d7000Patch
- https://git.kernel.org/stable/c/d349e9be5a2c2d7588a2c4e4bfa0bb3dc1226769Patch
FAQ
What is CVE-2022-49813?
CVE-2022-49813 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: net: ena: Fix error handling in ena_init() The ena_init() won't destroy workqueue created by create_singlethread_workqueue() when ...
How severe is CVE-2022-49813?
CVE-2022-49813 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49813?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.