
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49704 affects the Linux kernel, specifically the 9p filesystem component. The vulnerability was discovered in versions from 5.11 through 5.15.51 and 5.16 through 5.18.8. The issue involves a fid refcount leak in the v9fsvfsget_link function, where the protocol version check occurs after a fid has been obtained, leading to potential resource leaks (NVD).
The vulnerability stems from improper timing of protocol version validation in the v9fsvfsget_link function. The code checks for protocol version after obtaining a fid, which can lead to a reference count leak. The CVSS v3.1 base score is 5.5 (MEDIUM) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability affects system availability by causing resource leaks in the Linux kernel's 9p filesystem implementation. While there is no direct impact on confidentiality or integrity, the resource leak could potentially lead to system degradation or denial of service conditions (NVD).
The issue has been fixed by moving the protocol version check earlier in the code execution flow, before the fid is obtained. The fix is available through kernel patches that have been merged into the mainline. Users should update to Linux kernel versions 5.15.51 or later, or 5.18.8 or later to address this vulnerability (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."