In the Linux kernel, the following vulnerability has been resolved:
iommu/amd: Fix pci device refcount leak in ppr_notifier()
As comment of pci_get_domain_bus_and_slot() says, it returns
a pci device with refcount increment, when finish using it,
the caller must decrement the reference count by calling
pci_dev_put(). So call it before returning from ppr_notifier()
to avoid refcount leak.
References
Configurations
Configuration 1 (hide)
|
History
05 Feb 2026, 15:44
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/03f51c72997559e73b327608f0cccfded715c9a0 - Patch | |
| References | () https://git.kernel.org/stable/c/6cf0981c2233f97d56938d9d61845383d6eb227c - Patch | |
| References | () https://git.kernel.org/stable/c/6e501b3fd7a2e1c4372d72bc70717aaca2beb8a5 - Patch | |
| References | () https://git.kernel.org/stable/c/8581ec1feb895ff596fe3d326d9ba320083290aa - Patch | |
| References | () https://git.kernel.org/stable/c/902cc2507091a81643502d8ceb0e2f105e902518 - Patch | |
| References | () https://git.kernel.org/stable/c/b0637f4bd426925f5c3a15e8f8e36190fe06bac5 - Patch | |
| References | () https://git.kernel.org/stable/c/bdb2113dd8f17a3cc84a2b4be4968a849f69ec72 - Patch | |
| References | () https://git.kernel.org/stable/c/efd50c65fd1cdef63eb58825f3fe72496443764c - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Linux linux Kernel |
|
| CWE | NVD-CWE-Other | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
04 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-04 16:15
Updated : 2026-02-05 15:44
NVD link : CVE-2022-50505
Mitre link : CVE-2022-50505
CVE.ORG link : CVE-2022-50505
JSON object : View
Products Affected
linux
- linux_kernel
CWE
