CVE-2022-50645 PUBLISHED

Reported by Linux · Published December 9, 2025

In the Linux kernel, the following vulnerability has been resolved: EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper() As the comment of pci_get_domain_bus_and_slot() says, it returns a PCI device with refcount incremented, so it doesn't need to call an extra pci_dev_get() in pci_get_dev_wrapper(), and the PCI device needs to be put in the error path.

EPSS 0.04% · 10.8th percentile

Risk Scores

EPSS Score
0.04%
10.8th percentile

Affected Products

VendorProductVersions
LinuxLinuxd4dc89d069aab9074e2493a4c2f3969a0a0b91c1, d4dc89d069aab9074e2493a4c2f3969a0a0b91c1, d4dc89d069aab9074e2493a4c2f3969a0a0b91c1
LinuxLinux5.1, 0, 5.4.229
LinuxLinuxd4dc89d069aab9074e2493a4c2f3969a0a0b91c1, d4dc89d069aab9074e2493a4c2f3969a0a0b91c1, d4dc89d069aab9074e2493a4c2f3969a0a0b91c1
linuxlinux_kernel5.1, 5.1, 5.1

Timeline

References

Open in Interactive Console →