CVE-2022-50645
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a reference count leak in the Linux kernel's EDAC/i10nm component, specifically in the pci_get_dev_wrapper() function. The issue arises because pci_get_dev_wrapper() incorrectly increments the reference count of a PCI device when it should not, leading to a resource leak. The fix involves correcting the reference counting logic to prevent this leak.
How can this vulnerability impact me? :
The reference count leak can cause resource management issues in the Linux kernel, potentially leading to increased memory usage or resource exhaustion over time. This could degrade system stability or performance, especially in systems heavily using PCI devices managed by the affected component.