CVE-2022-49000 Affecting kernel-rt-debug package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-KERNELRTDEBUG-8238473
- published 22 Oct 2024
- disclosed 21 Oct 2024
Introduced: 21 Oct 2024
CVE-2022-49000 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:7
kernel-rt-debug
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-rt-debug
package and not the kernel-rt-debug
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: Fix PCI device refcount leak in has_external_pci()
for_each_pci_dev() is implemented by pci_get_device(). The comment of pci_get_device() says that it will increase the reference count for the returned pci_dev and also decrease the reference count for the input pci_dev @from if it is not NULL.
If we break for_each_pci_dev() loop with pdev not NULL, we need to call pci_dev_put() to decrease the reference count. Add the missing pci_dev_put() before 'return true' to avoid reference count leak.
References
- https://access.redhat.com/security/cve/CVE-2022-49000
- https://git.kernel.org/stable/c/10ed7655a17f6a3eaecd1293830488259ccd5723
- https://git.kernel.org/stable/c/17f67414718e6aba123335a33b7d15aa594fff34
- https://git.kernel.org/stable/c/afca9e19cc720bfafc75dc5ce429c185ca93f31d
- https://git.kernel.org/stable/c/b6eea8b2e858a20ad58ac62dc2de90fea2413f94