CVE-2022-50505

Source
https://cve.org/CVERecord?id=CVE-2022-50505
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50505.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50505
Downstream
Related
Published
2025-10-04T15:43:54.265Z
Modified
2026-03-20T11:47:30.844035Z
Summary
iommu/amd: Fix pci device refcount leak in ppr_notifier()
Details

In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: Fix pci device refcount leak in ppr_notifier()

As comment of pcigetdomainbusandslot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrement the reference count by calling pcidevput(). So call it before returning from pprnotifier() to avoid refcount leak.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50505.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
daae2d25a4779b272a66ddd01f5810bcee822b9e
Fixed
bdb2113dd8f17a3cc84a2b4be4968a849f69ec72
Fixed
efd50c65fd1cdef63eb58825f3fe72496443764c
Fixed
8581ec1feb895ff596fe3d326d9ba320083290aa
Fixed
03f51c72997559e73b327608f0cccfded715c9a0
Fixed
6e501b3fd7a2e1c4372d72bc70717aaca2beb8a5
Fixed
902cc2507091a81643502d8ceb0e2f105e902518
Fixed
b0637f4bd426925f5c3a15e8f8e36190fe06bac5
Fixed
6cf0981c2233f97d56938d9d61845383d6eb227c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50505.json"