CVE-2022-50443Linux vulnerability

5 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: drm/rockchip: lvds: fix PM usage counter unbalance in poweron pm_runtime_get_sync will increment pm usage counter even it failed. Forgetting to putting operation will result in reference leak here. We fix it by replacing it with the newest pm_runtime_resume_and_get to keep usage counter balanced.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel4.155.10.163+3
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux34cc0aa2545603560c79aaea3340d8ff3a71bd10110bf15825edf4f20bc4e56aba624297861b06ab+5
debiandebian/linux< linux 6.1.4-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-gw6p-9rm5-8qqm: In the Linux kernel, the following vulnerability has been resolved: drm/rockchip: lvds: fix PM usage counter unbalance in poweron pm_runtime_get_syn2025-10-01
OSV
CVE-2022-50443: In the Linux kernel, the following vulnerability has been resolved: drm/rockchip: lvds: fix PM usage counter unbalance in poweron pm_runtime_get_sync2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: drm/rockchip: lvds: fix PM usage counter unbalance in poweron2025-10-01
Debian
CVE-2022-50443: linux - In the Linux kernel, the following vulnerability has been resolved: drm/rockchi...2022