Improper Locking Affecting libperf package, versions <0:5.14.0-362.8.1.el9_3


Severity

Recommended
high

Based on CentOS security rating.

Threat Intelligence

EPSS
0.02% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS9-LIBPERF-9074816
  • published5 Mar 2025
  • disclosed26 Feb 2025

Introduced: 26 Feb 2025

CVE-2022-49316  (opens in a new tab)
CWE-667  (opens in a new tab)

How to fix?

Upgrade Centos:9 libperf to version 0:5.14.0-362.8.1.el9_3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libperf package and not the libperf package as distributed by Centos. See How to fix? for Centos:9 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

NFSv4: Don't hold the layoutget locks across multiple RPC calls

When doing layoutget as part of the open() compound, we have to be careful to release the layout locks before we can call any further RPC calls, such as setattr(). The reason is that those calls could trigger a recall, which could deadlock.

CVSS Base Scores

version 3.1