CVE-2022-49002
21.10.2024, 20:15
In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init() for_each_pci_dev() is implemented by pci_get_device(). The comment of pci_get_device() says that it will increase the reference count for the returned pci_dev and also decrease the reference count for the input pci_dev @from if it is not NULL. If we break for_each_pci_dev() loop with pdev not NULL, we need to call pci_dev_put() to decrease the reference count. Add the missing pci_dev_put() for the error path to avoid reference count leak.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 3.15 ≤ 𝑥 < 4.9.335 |
linux | linux_kernel | 4.10 ≤ 𝑥 < 4.14.301 |
linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.268 |
linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.226 |
linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.158 |
linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.82 |
linux | linux_kernel | 5.16 ≤ 𝑥 < 6.0.12 |
linux | linux_kernel | 6.1:rc1 |
linux | linux_kernel | 6.1:rc2 |
linux | linux_kernel | 6.1:rc3 |
linux | linux_kernel | 6.1:rc4 |
linux | linux_kernel | 6.1:rc5 |
linux | linux_kernel | 6.1:rc6 |
linux | linux_kernel | 6.1:rc7 |
𝑥
= Vulnerable software versions

Debian Releases
References