{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-49002","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-08-22T01:27:53.642Z","datePublished":"2024-10-21T20:06:16.093Z","dateUpdated":"2025-05-04T08:27:50.143Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T08:27:50.143Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init()\n\nfor_each_pci_dev() is implemented by pci_get_device(). The comment of\npci_get_device() says that it will increase the reference count for the\nreturned pci_dev and also decrease the reference count for the input\npci_dev @from if it is not NULL.\n\nIf we break for_each_pci_dev() loop with pdev not NULL, we need to call\npci_dev_put() to decrease the reference count. Add the missing\npci_dev_put() for the error path to avoid reference count leak."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/iommu/intel/dmar.c"],"versions":[{"version":"2e45528930388658603ea24d49cf52867b928d3e","lessThan":"d47bc9d7bcdbb9adc9703513d964b514fee5b0bf","status":"affected","versionType":"git"},{"version":"2e45528930388658603ea24d49cf52867b928d3e","lessThan":"71c4a621985fc051ab86d3a86c749069a993fcb2","status":"affected","versionType":"git"},{"version":"2e45528930388658603ea24d49cf52867b928d3e","lessThan":"876d7bfb89273997056220029ff12b1c2cc4691d","status":"affected","versionType":"git"},{"version":"2e45528930388658603ea24d49cf52867b928d3e","lessThan":"cbdd83bd2fd67142b03ce9dbdd1eab322ff7321f","status":"affected","versionType":"git"},{"version":"2e45528930388658603ea24d49cf52867b928d3e","lessThan":"a5c65cd56aed027f8a97fda8b691caaeb66d115e","status":"affected","versionType":"git"},{"version":"2e45528930388658603ea24d49cf52867b928d3e","lessThan":"bdb613ef179ad4bb9d56a2533e9b30e434f1dfb7","status":"affected","versionType":"git"},{"version":"2e45528930388658603ea24d49cf52867b928d3e","lessThan":"2a8f7b90681472948de172dbbf5a54cd342870aa","status":"affected","versionType":"git"},{"version":"2e45528930388658603ea24d49cf52867b928d3e","lessThan":"4bedbbd782ebbe7287231fea862c158d4f08a9e3","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/iommu/intel/dmar.c"],"versions":[{"version":"3.15","status":"affected"},{"version":"0","lessThan":"3.15","status":"unaffected","versionType":"semver"},{"version":"4.9.335","lessThanOrEqual":"4.9.*","status":"unaffected","versionType":"semver"},{"version":"4.14.301","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.268","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.226","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.158","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.82","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.0.12","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.15","versionEndExcluding":"4.9.335"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.15","versionEndExcluding":"4.14.301"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.15","versionEndExcluding":"4.19.268"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.15","versionEndExcluding":"5.4.226"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.15","versionEndExcluding":"5.10.158"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.15","versionEndExcluding":"5.15.82"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.15","versionEndExcluding":"6.0.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.15","versionEndExcluding":"6.1"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/d47bc9d7bcdbb9adc9703513d964b514fee5b0bf"},{"url":"https://git.kernel.org/stable/c/71c4a621985fc051ab86d3a86c749069a993fcb2"},{"url":"https://git.kernel.org/stable/c/876d7bfb89273997056220029ff12b1c2cc4691d"},{"url":"https://git.kernel.org/stable/c/cbdd83bd2fd67142b03ce9dbdd1eab322ff7321f"},{"url":"https://git.kernel.org/stable/c/a5c65cd56aed027f8a97fda8b691caaeb66d115e"},{"url":"https://git.kernel.org/stable/c/bdb613ef179ad4bb9d56a2533e9b30e434f1dfb7"},{"url":"https://git.kernel.org/stable/c/2a8f7b90681472948de172dbbf5a54cd342870aa"},{"url":"https://git.kernel.org/stable/c/4bedbbd782ebbe7287231fea862c158d4f08a9e3"}],"title":"iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2022-49002","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-10-22T13:15:03.202654Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-22T13:18:40.497Z"}}]}}