CVE-2022-49099

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49099
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49099.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49099
Related
Published
2025-02-26T07:00:47Z
Modified
2025-02-26T07:00:47Z
Downstream
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

Drivers: hv: vmbus: Fix initialization of device object in vmbusdeviceregister()

Initialize the device's dma{mask,parms} pointers and the device's dmamask value before invoking device_register(). Address the following trace with 5.17-rc7:

[ 49.646839] WARNING: CPU: 0 PID: 189 at include/linux/dma-mapping.h:543 netvscprobe+0x37a/0x3a0 [hvnetvsc] [ 49.646928] Call Trace: [ 49.646930] <TASK> [ 49.646935] vmbusprobe+0x40/0x60 [hvvmbus] [ 49.646942] reallyprobe+0x1ce/0x3b0 [ 49.646948] _driverprobedevice+0x109/0x180 [ 49.646952] driverprobedevice+0x23/0xa0 [ 49.646955] _deviceattachdriver+0x76/0xe0 [ 49.646958] ? driverallowsasyncprobing+0x50/0x50 [ 49.646961] busforeachdrv+0x84/0xd0 [ 49.646964] _deviceattach+0xed/0x170 [ 49.646967] deviceinitialprobe+0x13/0x20 [ 49.646970] busprobedevice+0x8f/0xa0 [ 49.646973] deviceadd+0x41a/0x8e0 [ 49.646975] ? hrtimerinit+0x28/0x80 [ 49.646981] deviceregister+0x1b/0x20 [ 49.646983] vmbusdeviceregister+0x5e/0xf0 [hvvmbus] [ 49.646991] vmbusaddchannelwork+0x12d/0x190 [hvvmbus] [ 49.646999] processonework+0x21d/0x3f0 [ 49.647002] workerthread+0x4a/0x3b0 [ 49.647005] ? processonework+0x3f0/0x3f0 [ 49.647007] kthread+0xff/0x130 [ 49.647011] ? kthreadcompleteandexit+0x20/0x20 [ 49.647015] retfrom_fork+0x22/0x30 [ 49.647020] </TASK> [ 49.647021] ---[ end trace 0000000000000000 ]---

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.17.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.17.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}