CVE-2022-50505Improper Update of Reference Count in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Fix pci device refcount leak in ppr_notifier() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrement the reference count by calling pci_dev_put(). So call it before returning from ppr_notifier() to avoid refcount leak.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel4.144.14.303+6
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linuxdaae2d25a4779b272a66ddd01f5810bcee822b9ebdb2113dd8f17a3cc84a2b4be4968a849f69ec72+8
debiandebian/linux< linux 6.1.4-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2022-50505: In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Fix pci device refcount leak in ppr_notifier() As comment of pci_get_do2025-10-04
GHSA
GHSA-354h-9xfq-qm7v: In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Fix pci device refcount leak in ppr_notifier() As comment of pci_get_2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: iommu/amd: Fix pci device refcount leak in ppr_notifier()2025-10-04
Debian
CVE-2022-50505: linux - In the Linux kernel, the following vulnerability has been resolved: iommu/amd: ...2022