-

CVE-2022-50868

In the Linux kernel, the following vulnerability has been resolved:

hwrng: amd - Fix PCI device refcount leak

for_each_pci_dev() is implemented by pci_get_device(). The comment of
pci_get_device() says that it will increase the reference count for the
returned pci_dev and also decrease the reference count for the input
pci_dev @from if it is not NULL.

If we break for_each_pci_dev() loop with pdev not NULL, we need to call
pci_dev_put() to decrease the reference count. Add the missing
pci_dev_put() for the normal and error path.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < f1c97f72ffd504f49882774e2ab689d982dc7afc
Version 96d63c0297ccfd6d9059c614b3f5555d9441a2b3
Status affected
Version < 526c316948819d3ecd2bb20fe5e2580c51a1b760
Version 96d63c0297ccfd6d9059c614b3f5555d9441a2b3
Status affected
Version < e246f5eff26055bdcb61a2cc99c50af72a19680f
Version 96d63c0297ccfd6d9059c614b3f5555d9441a2b3
Status affected
Version < 1199f8e02941b326c60ab71a63002b7c80e38212
Version 96d63c0297ccfd6d9059c614b3f5555d9441a2b3
Status affected
Version < 5998e5c30e839f73e62cb29e0d9617b0d16ccba3
Version 96d63c0297ccfd6d9059c614b3f5555d9441a2b3
Status affected
Version < 2b79a5e560779b35e1164d57ae35c48b43373082
Version 96d63c0297ccfd6d9059c614b3f5555d9441a2b3
Status affected
Version < cb348c7908631dd9f60083a0a1542eab055d3edf
Version 96d63c0297ccfd6d9059c614b3f5555d9441a2b3
Status affected
Version < 2e10ecd012ae2b2a374b34f307e9bc1e6096c03d
Version 96d63c0297ccfd6d9059c614b3f5555d9441a2b3
Status affected
Version < ecadb5b0111ea19fc7c240bb25d424a94471eb7d
Version 96d63c0297ccfd6d9059c614b3f5555d9441a2b3
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.18
Status affected
Version < 2.6.18
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.145
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.