-

CVE-2022-50760

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix PCI device refcount leak in amdgpu_atrm_get_bios()

As comment of pci_get_class() says, it returns a pci_device with its
refcount increased and decreased the refcount for the input parameter
@from if it is not NULL.

If we break the loop in amdgpu_atrm_get_bios() with 'pdev' not NULL, we
need to call pci_dev_put() to decrease the refcount. Add the missing
pci_dev_put() to avoid refcount leak.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 6611feef35c0c8c4d297b28a7fc6ab3a2c47eca7
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status affected
Version < da7c78ea9e62bb65273d3ff19a3866ec205bfe18
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status affected
Version < 3360125d721c91d697c71201f18f042ff743e936
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status affected
Version < 981024abf5fe605c94d4f906f65d1b3408d628be
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status affected
Version < 7c1ddf7c664b5bc91f14b1bdeaa45520ef1760e4
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status affected
Version < 8f2d2badf8ca5e7e7c30d88840b695c8af7286f3
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status affected
Version < 9d4057d0452243917e12eb19f1599c96f2f05b14
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status affected
Version < a8b54ad7106c0604c4adc4933138b3557739bce0
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status affected
Version < ca54639c7752edf1304d92ff4d0c049d4efc9ba0
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.2
Status affected
Version < 4.2
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.146
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.