CVE-2022-50645
EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper()
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper() As the comment of pci_get_domain_bus_and_slot() says, it returns a PCI device with refcount incremented, so it doesn't need to call an extra pci_dev_get() in pci_get_dev_wrapper(), and the PCI device needs to be put in the error path.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Dec 9, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
d4dc89d069aab9074e2493a4c2f3969a0a0b91c1 < e6e295a434d1c917a017980389aec88bf35cc81b d4dc89d069aab9074e2493a4c2f3969a0a0b91c1 < 2db53c7059167b63cc790366ef1a9e286e71980b d4dc89d069aab9074e2493a4c2f3969a0a0b91c1 < 3e255dc21031cc1f341584eb99a7f31598bf0be7 d4dc89d069aab9074e2493a4c2f3969a0a0b91c1 < 1adb2583cdbd75f379e3230a43a7412d373d499f d4dc89d069aab9074e2493a4c2f3969a0a0b91c1 < f29c2f57cdf7a57223dcd9fbaa2261faab5234b2 d4dc89d069aab9074e2493a4c2f3969a0a0b91c1 < 9c8921555907f4d723f01ed2d859b66f2d14f08e
Linux / Linux
5.1
References
git.kernel.org: https://git.kernel.org/stable/c/e6e295a434d1c917a017980389aec88bf35cc81b git.kernel.org: https://git.kernel.org/stable/c/2db53c7059167b63cc790366ef1a9e286e71980b git.kernel.org: https://git.kernel.org/stable/c/3e255dc21031cc1f341584eb99a7f31598bf0be7 git.kernel.org: https://git.kernel.org/stable/c/1adb2583cdbd75f379e3230a43a7412d373d499f git.kernel.org: https://git.kernel.org/stable/c/f29c2f57cdf7a57223dcd9fbaa2261faab5234b2 git.kernel.org: https://git.kernel.org/stable/c/9c8921555907f4d723f01ed2d859b66f2d14f08e