CVE-2022-50645

Source
https://cve.org/CVERecord?id=CVE-2022-50645
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50645.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50645
Downstream
Published
2025-12-09T00:00:19.652Z
Modified
2026-03-20T11:47:33.830029Z
Summary
EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper()
Details

In the Linux kernel, the following vulnerability has been resolved:

EDAC/i10nm: fix refcount leak in pcigetdev_wrapper()

As the comment of pcigetdomainbusandslot() says, it returns a PCI device with refcount incremented, so it doesn't need to call an extra pcidevget() in pcigetdevwrapper(), and the PCI device needs to be put in the error path.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50645.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d4dc89d069aab9074e2493a4c2f3969a0a0b91c1
Fixed
e6e295a434d1c917a017980389aec88bf35cc81b
Fixed
2db53c7059167b63cc790366ef1a9e286e71980b
Fixed
3e255dc21031cc1f341584eb99a7f31598bf0be7
Fixed
1adb2583cdbd75f379e3230a43a7412d373d499f
Fixed
f29c2f57cdf7a57223dcd9fbaa2261faab5234b2
Fixed
9c8921555907f4d723f01ed2d859b66f2d14f08e

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50645.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.1.0
Fixed
5.4.229
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.163
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.86
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.16
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50645.json"