CVE-2022-50576Linux vulnerability

6 documents5 sources
Severity
N/A
No vector
EPSS
0.1%
top 80.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 22

Description

In the Linux kernel, the following vulnerability has been resolved: serial: pch: Fix PCI device refcount leak in pch_request_dma() As comment of pci_get_slot() says, it returns a pci_device with its refcount increased. The caller must decrement the reference count by calling pci_dev_put(). Since 'dma_dev' is only used to filter the channel in filter(), we can call pci_dev_put() before exiting from pch_request_dma(). Add the missing pci_dev_put() for the normal and error path.

Affected Packages4 packages

Linuxlinux/linux_kernel2.6.384.9.337+7
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux3c6a483275f47a2ef7119309ad3d791c10cf30da90ff030ca10b69feeebda1427550ebf9ed2ad868+9
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2022-50576: In the Linux kernel, the following vulnerability has been resolved: serial: pch: Fix PCI device refcount leak in pch_request_dma() As comment of pci_g2025-10-22
OSV
serial: pch: Fix PCI device refcount leak in pch_request_dma()2025-10-22
GHSA
GHSA-jchm-w95j-v3v9: In the Linux kernel, the following vulnerability has been resolved: serial: pch: Fix PCI device refcount leak in pch_request_dma() As comment of pci2025-10-22

📋Vendor Advisories

2
Red Hat
kernel: serial: pch: Fix PCI device refcount leak in pch_request_dma()2025-10-22
Debian
CVE-2022-50576: linux - In the Linux kernel, the following vulnerability has been resolved: serial: pch...2022