CVE-2022-50645Missing Release of Resource after Effective Lifetime in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 85.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper() As the comment of pci_get_domain_bus_and_slot() says, it returns a PCI device with refcount incremented, so it doesn't need to call an extra pci_dev_get() in pci_get_dev_wrapper(), and the PCI device needs to be put in the error path.

Affected Packages4 packages

Linuxlinux/linux_kernel5.1.05.4.229+4
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linuxd4dc89d069aab9074e2493a4c2f3969a0a0b91c1e6e295a434d1c917a017980389aec88bf35cc81b+6
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
OSV
EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper()2025-12-09
GHSA
GHSA-qvjv-q9pq-qrxr: In the Linux kernel, the following vulnerability has been resolved: EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper() As the comment of pci_get2025-12-09
OSV
CVE-2022-50645: In the Linux kernel, the following vulnerability has been resolved: EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper() As the comment of pci_get_d2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper()2025-12-09
Debian
CVE-2022-50645: linux - In the Linux kernel, the following vulnerability has been resolved: EDAC/i10nm:...2022