In the Linux kernel, the following vulnerability has been resolved:
ixgbe: fix pci device refcount leak
As the comment of pci_get_domain_bus_and_slot() says, it
returns a PCI device with refcount incremented, when finish
using it, the caller must decrement the reference count by
calling pci_dev_put().
In ixgbe_get_first_secondary_devfn() and ixgbe_x550em_a_has_mii(),
pci_dev_put() is called to avoid leak.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < 5.4.0-144.161 | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-70.77 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1097.105 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1034.38 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1034.38~20.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < 5.4.0-1104.110 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < 5.15.0-1036.43 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-5.15 | < 5.15.0-1036.43~20.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-5.4 | < any | UNKNOWN |
git.kernel.org/linus/b93fb4405fcb5112c5739c5349afb52ec7f15c07 (6.2-rc4)
git.kernel.org/stable/c/112df4cd2b09acd64bcd18f5ef83ba5d07b34bf0
git.kernel.org/stable/c/4c93422a54cd6a349988f42e1c6bf082cf4ea9d8
git.kernel.org/stable/c/53cefa802f070d46c0c518f4865be2c749818a18
git.kernel.org/stable/c/b93fb4405fcb5112c5739c5349afb52ec7f15c07
git.kernel.org/stable/c/c49996c6aa03590e4ef5add8772cb6068d99fd59
launchpad.net/bugs/cve/CVE-2022-48896
nvd.nist.gov/vuln/detail/CVE-2022-48896
security-tracker.debian.org/tracker/CVE-2022-48896
www.cve.org/CVERecord?id=CVE-2022-48896