CVE-2022-50470

Source
https://cve.org/CVERecord?id=CVE-2022-50470
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50470.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50470
Downstream
Related
Published
2025-10-04T15:16:32.764Z
Modified
2026-03-20T11:47:29.243479Z
Summary
xhci: Remove device endpoints from bandwidth list when freeing the device
Details

In the Linux kernel, the following vulnerability has been resolved:

xhci: Remove device endpoints from bandwidth list when freeing the device

Endpoints are normally deleted from the bandwidth list when they are dropped, before the virt device is freed.

If xHC host is dying or being removed then the endpoints aren't dropped cleanly due to functions returning early to avoid interacting with a non-accessible host controller.

So check and delete endpoints that are still on the bandwidth list when freeing the virt device.

Solves a listdel corruption kernel crash when unbinding xhci-pci, caused by xhcimem_cleanup() when it later tried to delete already freed endpoints from the bandwidth list.

This only affects hosts that use software bandwidth checking, which currenty is only the xHC in intel Panther Point PCH (Ivy Bridge)

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50470.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2e27980e6eb78114c4ecbaad1ba71836e3887d18
Fixed
5e4ce28ad907aa54f13b21d5f1dc490525957b0c
Fixed
f0de39474078adef6ece7a183e34c15ce2c1d8d1
Fixed
cebbc8d335d6bcc1316584f779c08f80287c6af8
Fixed
8f1cd9633d1f21efc13e8fc75be8f2b6bb85e38c
Fixed
678d2cc2041cc6ce05030852dce9ad42719abcfc
Fixed
c892a81c7424b4f6a660cb9c249d354ccf3afeca
Fixed
3bf860a41e0f2fcea0ac3aae8f7ef887a7994b70
Fixed
5aed5b7c2430ce318a8e62f752f181e66f0d1053

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50470.json"