๐Ÿ” CVE Alert

CVE-2022-49434

UNKNOWN 0.0

PCI: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: PCI: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store() The sysfs sriov_numvfs_store() path acquires the device lock before the config space access lock: sriov_numvfs_store device_lock # A (1) acquire device lock sriov_configure vfio_pci_sriov_configure # (for example) vfio_pci_core_sriov_configure pci_disable_sriov sriov_disable pci_cfg_access_lock pci_wait_cfg # B (4) wait for dev->block_cfg_access == 0 Previously, pci_dev_lock() acquired the config space access lock before the device lock: pci_dev_lock pci_cfg_access_lock dev->block_cfg_access = 1 # B (2) set dev->block_cfg_access = 1 device_lock # A (3) wait for device lock Any path that uses pci_dev_lock(), e.g., pci_reset_function(), may deadlock with sriov_numvfs_store() if the operations occur in the sequence (1) (2) (3) (4). Avoid the deadlock by reversing the order in pci_dev_lock() so it acquires the device lock before the config space access lock, the same as the sriov_numvfs_store() path. [bhelgaas: combined and adapted commit log from Jay Zhou's independent subsequent posting: https://lore.kernel.org/r/[email protected]]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
17530e71e0166a37f8e20a9b7bcf1d50ae3cff8e < c3c6dc1853b8bf3c718f96fd8480a6eb09ba4831 17530e71e0166a37f8e20a9b7bcf1d50ae3cff8e < aed6d4d519210c28817948f34c53b6e058e0456c 17530e71e0166a37f8e20a9b7bcf1d50ae3cff8e < c9a81f9ed6ae3554621d6a50220b1bc74b67d81e 17530e71e0166a37f8e20a9b7bcf1d50ae3cff8e < eff3587b9c01439b738298475e555c028ac9f55e 17530e71e0166a37f8e20a9b7bcf1d50ae3cff8e < 2cdd5284035322795b0964f899eefba254cfe483 17530e71e0166a37f8e20a9b7bcf1d50ae3cff8e < ea047f51172aa68841adef7f52d375002438b8f0 17530e71e0166a37f8e20a9b7bcf1d50ae3cff8e < 59ea6b3ae51df7cd6bfd84c9c0030609b9315622 17530e71e0166a37f8e20a9b7bcf1d50ae3cff8e < a91ee0e9fca9d7501286cfbced9b30a33e52740a
Linux / Linux
4.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c3c6dc1853b8bf3c718f96fd8480a6eb09ba4831 git.kernel.org: https://git.kernel.org/stable/c/aed6d4d519210c28817948f34c53b6e058e0456c git.kernel.org: https://git.kernel.org/stable/c/c9a81f9ed6ae3554621d6a50220b1bc74b67d81e git.kernel.org: https://git.kernel.org/stable/c/eff3587b9c01439b738298475e555c028ac9f55e git.kernel.org: https://git.kernel.org/stable/c/2cdd5284035322795b0964f899eefba254cfe483 git.kernel.org: https://git.kernel.org/stable/c/ea047f51172aa68841adef7f52d375002438b8f0 git.kernel.org: https://git.kernel.org/stable/c/59ea6b3ae51df7cd6bfd84c9c0030609b9315622 git.kernel.org: https://git.kernel.org/stable/c/a91ee0e9fca9d7501286cfbced9b30a33e52740a