CVE-2022-49000

Source
https://cve.org/CVERecord?id=CVE-2022-49000
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49000.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49000
Downstream
Related
Published
2024-10-21T20:06:14.753Z
Modified
2026-03-12T03:24:26.390581Z
Summary
iommu/vt-d: Fix PCI device refcount leak in has_external_pci()
Details

In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix PCI device refcount leak in hasexternalpci()

foreachpcidev() is implemented by pcigetdevice(). The comment of pcigetdevice() says that it will increase the reference count for the returned pcidev and also decrease the reference count for the input pci_dev @from if it is not NULL.

If we break foreachpcidev() loop with pdev not NULL, we need to call pcidevput() to decrease the reference count. Add the missing pcidev_put() before 'return true' to avoid reference count leak.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49000.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
89a6079df791aeace2044ea93be1b397195824ec
Fixed
10ed7655a17f6a3eaecd1293830488259ccd5723
Fixed
b6eea8b2e858a20ad58ac62dc2de90fea2413f94
Fixed
17f67414718e6aba123335a33b7d15aa594fff34
Fixed
afca9e19cc720bfafc75dc5ce429c185ca93f31d

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49000.json"