-
CVE-2022-50505
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:43:54
- Zuletzt bearbeitet 06.10.2025 14:56:21
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Fix pci device refcount leak in ppr_notifier() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrement the reference count by calling pci_dev_put(). So call it before returning from ppr_notifier() to avoid refcount leak.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
bdb2113dd8f17a3cc84a2b4be4968a849f69ec72
Version
daae2d25a4779b272a66ddd01f5810bcee822b9e
Status
affected
Version <
efd50c65fd1cdef63eb58825f3fe72496443764c
Version
daae2d25a4779b272a66ddd01f5810bcee822b9e
Status
affected
Version <
8581ec1feb895ff596fe3d326d9ba320083290aa
Version
daae2d25a4779b272a66ddd01f5810bcee822b9e
Status
affected
Version <
03f51c72997559e73b327608f0cccfded715c9a0
Version
daae2d25a4779b272a66ddd01f5810bcee822b9e
Status
affected
Version <
6e501b3fd7a2e1c4372d72bc70717aaca2beb8a5
Version
daae2d25a4779b272a66ddd01f5810bcee822b9e
Status
affected
Version <
902cc2507091a81643502d8ceb0e2f105e902518
Version
daae2d25a4779b272a66ddd01f5810bcee822b9e
Status
affected
Version <
b0637f4bd426925f5c3a15e8f8e36190fe06bac5
Version
daae2d25a4779b272a66ddd01f5810bcee822b9e
Status
affected
Version <
6cf0981c2233f97d56938d9d61845383d6eb227c
Version
daae2d25a4779b272a66ddd01f5810bcee822b9e
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.14
Status
affected
Version <
4.14
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.053 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|