CVE-2022-50615Missing Release of Resource after Effective Lifetime in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 89.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8

Description

In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map() pci_get_device() will increase the reference count for the returned pci_dev, so snr_uncore_get_mc_dev() will return a pci_dev with its reference count increased. We need to call pci_dev_put() to decrease the reference count. Let's add the missing pci_dev_put().

Affected Packages4 packages

Linuxlinux/linux_kernel5.3.05.10.163+3
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linuxee49532b38dd084650bf715eabe7e3828fb8d275d2afced51108813256d8072c6e464b0c9f0bb890+5
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-vw48-v9x9-57g8: In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map() pci_get2025-12-08
OSV
perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map()2025-12-08
OSV
CVE-2022-50615: In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map() pci_get_d2025-12-08

📋Vendor Advisories

2
Red Hat
kernel: perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map()2025-12-08
Debian
CVE-2022-50615: linux - In the Linux kernel, the following vulnerability has been resolved: perf/x86/in...2022