CVE-2022-49434

In the Linux kernel, the following vulnerability has been resolved: PCI: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store() The sysfs sriov_numvfs_store() path acquires the device lock before the config space access lock: sriov_numvfs_store device_lock # A (1) acquire device lock sriov_configure vfio_pci_sriov_configure # (for example) vfio_pci_core_sriov_configure pci_disable_sriov sriov_disable pci_cfg_access_lock pci_wait_cfg # B (4) wait for dev->block_cfg_access == 0 Previously, pci_dev_lock() acquired the config space access lock before the device lock: pci_dev_lock pci_cfg_access_lock dev->block_cfg_access = 1 # B (2) set dev->block_cfg_access = 1 device_lock # A (3) wait for device lock Any path that uses pci_dev_lock(), e.g., pci_reset_function(), may deadlock with sriov_numvfs_store() if the operations occur in the sequence (1) (2) (3) (4). Avoid the deadlock by reversing the order in pci_dev_lock() so it acquires the device lock before the config space access lock, the same as the sriov_numvfs_store() path. [bhelgaas: combined and adapted commit log from Jay Zhou's independent subsequent posting: https://lore.kernel.org/r/20220404062539.1710-1-jianjay.zhou@huawei.com]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

22 Oct 2025, 17:26

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: evitar el bloqueo AB/BA de pci_dev_lock() con sriov_numvfs_store() La ruta sysfs sriov_numvfs_store() adquiere el bloqueo del dispositivo antes del bloqueo de acceso al espacio de configuración: sriov_numvfs_store device_lock # A (1) adquirir bloqueo del dispositivo sriov_configure vfio_pci_sriov_configure # (por ejemplo) vfio_pci_core_sriov_configure pci_disable_sriov sriov_disable pci_cfg_access_lock pci_wait_cfg # B (4) esperar a que dev->block_cfg_access == 0 Anteriormente, pci_dev_lock() adquiría el bloqueo de acceso al espacio de configuración antes del bloqueo del dispositivo: pci_dev_lock pci_cfg_access_lock dev->block_cfg_access = 1 # B (2) set dev->block_cfg_access = 1 device_lock # A (3) esperar a que se bloquee el dispositivo Cualquier ruta que use pci_dev_lock(), p. ej., pci_reset_function(), puede bloquearse con sriov_numvfs_store() si las operaciones ocurren en la secuencia (1) (2) (3) (4). Evite el bloqueo invirtiendo el orden en pci_dev_lock() para que adquiera el bloqueo del dispositivo antes del bloqueo de acceso al espacio de configuración, lo mismo que la ruta sriov_numvfs_store(). [bhelgaas: registro de confirmación combinado y adaptado de la publicación posterior independiente de Jay Zhou: https://lore.kernel.org/r/20220404062539.1710-1-jianjay.zhou@huawei.com]
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/2cdd5284035322795b0964f899eefba254cfe483 - () https://git.kernel.org/stable/c/2cdd5284035322795b0964f899eefba254cfe483 - Patch
References () https://git.kernel.org/stable/c/59ea6b3ae51df7cd6bfd84c9c0030609b9315622 - () https://git.kernel.org/stable/c/59ea6b3ae51df7cd6bfd84c9c0030609b9315622 - Patch
References () https://git.kernel.org/stable/c/a91ee0e9fca9d7501286cfbced9b30a33e52740a - () https://git.kernel.org/stable/c/a91ee0e9fca9d7501286cfbced9b30a33e52740a - Patch
References () https://git.kernel.org/stable/c/aed6d4d519210c28817948f34c53b6e058e0456c - () https://git.kernel.org/stable/c/aed6d4d519210c28817948f34c53b6e058e0456c - Patch
References () https://git.kernel.org/stable/c/c3c6dc1853b8bf3c718f96fd8480a6eb09ba4831 - () https://git.kernel.org/stable/c/c3c6dc1853b8bf3c718f96fd8480a6eb09ba4831 - Patch
References () https://git.kernel.org/stable/c/c9a81f9ed6ae3554621d6a50220b1bc74b67d81e - () https://git.kernel.org/stable/c/c9a81f9ed6ae3554621d6a50220b1bc74b67d81e - Patch
References () https://git.kernel.org/stable/c/da9792920ab525b8a932aa9aeee34529ad7b83f7 - () https://git.kernel.org/stable/c/da9792920ab525b8a932aa9aeee34529ad7b83f7 - Patch
References () https://git.kernel.org/stable/c/ea047f51172aa68841adef7f52d375002438b8f0 - () https://git.kernel.org/stable/c/ea047f51172aa68841adef7f52d375002438b8f0 - Patch
References () https://git.kernel.org/stable/c/eff3587b9c01439b738298475e555c028ac9f55e - () https://git.kernel.org/stable/c/eff3587b9c01439b738298475e555c028ac9f55e - Patch
CWE CWE-667

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-10-22 17:26


NVD link : CVE-2022-49434

Mitre link : CVE-2022-49434

CVE.ORG link : CVE-2022-49434


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking