CVE-2022-50868
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
30/12/2025
Última modificación:
30/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
hwrng: amd - Fix PCI device refcount leak<br />
<br />
for_each_pci_dev() is implemented by pci_get_device(). The comment of<br />
pci_get_device() says that it will increase the reference count for the<br />
returned pci_dev and also decrease the reference count for the input<br />
pci_dev @from if it is not NULL.<br />
<br />
If we break for_each_pci_dev() loop with pdev not NULL, we need to call<br />
pci_dev_put() to decrease the reference count. Add the missing<br />
pci_dev_put() for the normal and error path.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/1199f8e02941b326c60ab71a63002b7c80e38212
- https://git.kernel.org/stable/c/2b79a5e560779b35e1164d57ae35c48b43373082
- https://git.kernel.org/stable/c/2e10ecd012ae2b2a374b34f307e9bc1e6096c03d
- https://git.kernel.org/stable/c/526c316948819d3ecd2bb20fe5e2580c51a1b760
- https://git.kernel.org/stable/c/5998e5c30e839f73e62cb29e0d9617b0d16ccba3
- https://git.kernel.org/stable/c/cb348c7908631dd9f60083a0a1542eab055d3edf
- https://git.kernel.org/stable/c/e246f5eff26055bdcb61a2cc99c50af72a19680f
- https://git.kernel.org/stable/c/ecadb5b0111ea19fc7c240bb25d424a94471eb7d
- https://git.kernel.org/stable/c/f1c97f72ffd504f49882774e2ab689d982dc7afc



