-

CVE-2022-50760

drm/amdgpu: Fix PCI device refcount leak in amdgpu_atrm_get_bios()

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix PCI device refcount leak in amdgpu_atrm_get_bios()

As comment of pci_get_class() says, it returns a pci_device with its
refcount increased and decreased the refcount for the input parameter
@from if it is not NULL.

If we break the loop in amdgpu_atrm_get_bios() with 'pdev' not NULL, we
need to call pci_dev_put() to decrease the refcount. Add the missing
pci_dev_put() to avoid refcount leak.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Version < 6611feef35c0c8c4d297b28a7fc6ab3a2c47eca7
Status affected
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Version < da7c78ea9e62bb65273d3ff19a3866ec205bfe18
Status affected
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Version < 3360125d721c91d697c71201f18f042ff743e936
Status affected
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Version < 981024abf5fe605c94d4f906f65d1b3408d628be
Status affected
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Version < 7c1ddf7c664b5bc91f14b1bdeaa45520ef1760e4
Status affected
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Version < 8f2d2badf8ca5e7e7c30d88840b695c8af7286f3
Status affected
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Version < 9d4057d0452243917e12eb19f1599c96f2f05b14
Status affected
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Version < a8b54ad7106c0604c4adc4933138b3557739bce0
Status affected
Version d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Version < ca54639c7752edf1304d92ff4d0c049d4efc9ba0
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.2
Status affected
Version 0
Version < 4.2
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.196
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.