-

CVE-2022-50659

In the Linux kernel, the following vulnerability has been resolved:

hwrng: geode - Fix PCI device refcount leak

for_each_pci_dev() is implemented by pci_get_device(). The comment of
pci_get_device() says that it will increase the reference count for the
returned pci_dev and also decrease the reference count for the input
pci_dev @from if it is not NULL.

If we break for_each_pci_dev() loop with pdev not NULL, we need to call
pci_dev_put() to decrease the reference count. We add a new struct
'amd_geode_priv' to record pointer of the pci_dev and membase, and then
add missing pci_dev_put() for the normal and error path.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 88f4ea623f59155280d99d1a59a968f838472c4a
Version ef5d862734b84239e0140319a95fb0bbff5ef394
Status affected
Version < e2f44baf62567c5cfbc274974c7d96dddad53ccc
Version ef5d862734b84239e0140319a95fb0bbff5ef394
Status affected
Version < 6b9e43c4098f1310f5b4d52121d007a219fa5d43
Version ef5d862734b84239e0140319a95fb0bbff5ef394
Status affected
Version < 5cc818ad53df650cac8fb41d9066665366af3f03
Version ef5d862734b84239e0140319a95fb0bbff5ef394
Status affected
Version < aa96aff394a511cc7bb7df08d1b8504d4d97671e
Version ef5d862734b84239e0140319a95fb0bbff5ef394
Status affected
Version < 82bd423ed977847652b2048b0f8dcf049b1847a9
Version ef5d862734b84239e0140319a95fb0bbff5ef394
Status affected
Version < 874f798c2db5ad595e46982d7f727a679dacb048
Version ef5d862734b84239e0140319a95fb0bbff5ef394
Status affected
Version < 19b7b85773b18457ff85a9ff4f5e2a2d4bf7ed0c
Version ef5d862734b84239e0140319a95fb0bbff5ef394
Status affected
Version < 9f6ec8dc574efb7f4f3d7ee9cd59ae307e78f445
Version ef5d862734b84239e0140319a95fb0bbff5ef394
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.18
Status affected
Version < 2.6.18
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.091
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String