In the Linux kernel, the following vulnerability has been resolved:
mctp i2c: don't count unused / invalid keys for flow release
We're currently hitting the WARN_ON in mctp_i2c_flow_release:
if (midev->release_count > midev->i2c_lock_count) {
WARN_ONCE(1, "release count overflow");
This may be hit if we expire a flow before sending the first packet it
contains - as we will not be pairing the increment of release_count
(performed on flow release) with the i2c lock operation (only
performed on actual TX).
To fix this, only release a flow if we've encountered it previously (ie,
dev_flow_state does not indicate NEW), as we will mark the flow as
ACTIVE at the same time as accounting for the i2c lock operation. We
also need to add an INVALID flow state, to indicate when we've done the
release.
References
Configurations
Configuration 1 (hide)
|
History
10 Nov 2025, 20:45
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Linux linux Kernel |
|
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/9cbd48d5fa14e4c65f8580de16686077f7cea02b - Patch | |
| References | () https://git.kernel.org/stable/c/a5915a9a3ab4067ef8996a57738d156eabeb3a12 - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
02 May 2025, 13:53
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
01 May 2025, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-01 15:16
Updated : 2025-11-10 20:45
NVD link : CVE-2022-49820
Mitre link : CVE-2022-49820
CVE.ORG link : CVE-2022-49820
JSON object : View
Products Affected
linux
- linux_kernel
CWE
