๐Ÿ” CVE Alert

CVE-2022-50337

UNKNOWN 0.0

ocxl: fix pci device refcount leak when calling get_function_0()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ocxl: fix pci device refcount leak when calling get_function_0() get_function_0() calls pci_get_domain_bus_and_slot(), as comment says, it returns a pci device with refcount increment, so after using it, pci_dev_put() needs be called. Get the device reference when get_function_0() is not called, so pci_dev_put() can be called in the error path and callers unconditionally. And add comment above get_dvsec_vendor0() to tell callers to call pci_dev_put().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 15, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
87db7579ebd5ded337056eb765542eb2608f16e3 < a40e1b0a922a53fa925ea8b296e3de30a31ed028 87db7579ebd5ded337056eb765542eb2608f16e3 < 37a13b274e4513c757e50c002ddcbf4bc89adbb2 87db7579ebd5ded337056eb765542eb2608f16e3 < 9a1b3148975b71fdc194e62612478346bbe618cd 87db7579ebd5ded337056eb765542eb2608f16e3 < 40ff4c2335a98f0ee96b099bfd70b8e6644f321f 87db7579ebd5ded337056eb765542eb2608f16e3 < 27158c72678b39ee01cc01de1aba6b51c71abe2f
Linux / Linux
5.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a40e1b0a922a53fa925ea8b296e3de30a31ed028 git.kernel.org: https://git.kernel.org/stable/c/37a13b274e4513c757e50c002ddcbf4bc89adbb2 git.kernel.org: https://git.kernel.org/stable/c/9a1b3148975b71fdc194e62612478346bbe618cd git.kernel.org: https://git.kernel.org/stable/c/40ff4c2335a98f0ee96b099bfd70b8e6644f321f git.kernel.org: https://git.kernel.org/stable/c/27158c72678b39ee01cc01de1aba6b51c71abe2f