CVE-2022-50337
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
15/09/2025
Last modified:
04/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ocxl: fix pci device refcount leak when calling get_function_0()<br />
<br />
get_function_0() calls pci_get_domain_bus_and_slot(), as comment<br />
says, it returns a pci device with refcount increment, so after<br />
using it, pci_dev_put() needs be called.<br />
<br />
Get the device reference when get_function_0() is not called, so<br />
pci_dev_put() can be called in the error path and callers<br />
unconditionally. And add comment above get_dvsec_vendor0() to tell<br />
callers to call pci_dev_put().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.9 (including) | 5.10.163 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.86 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1 (including) | 6.1.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/27158c72678b39ee01cc01de1aba6b51c71abe2f
- https://git.kernel.org/stable/c/37a13b274e4513c757e50c002ddcbf4bc89adbb2
- https://git.kernel.org/stable/c/40ff4c2335a98f0ee96b099bfd70b8e6644f321f
- https://git.kernel.org/stable/c/9a1b3148975b71fdc194e62612478346bbe618cd
- https://git.kernel.org/stable/c/a40e1b0a922a53fa925ea8b296e3de30a31ed028



