CVE-2022-50718
Reference Count Leak in Linux Kernel AMDGPU PCI Device Handling
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a reference count leak in the Linux kernel's AMD GPU driver (drm/amdgpu). Specifically, the function pci_get_domain_bus_and_slot() increments the reference count of a PCI device, and the caller is responsible for decrementing it by calling pci_dev_put(). The vulnerability occurred because pci_dev_put() was not called before returning from the functions amdgpu_device_resume and suspend_display_audio, causing a reference count leak.
How can this vulnerability impact me? :
The reference count leak can lead to resource leaks in the kernel, potentially causing increased memory usage or instability in the system over time as PCI device references are not properly released.
What immediate steps should I take to mitigate this vulnerability?
Apply the updated Linux kernel patch that fixes the pci device reference count leak in the amdgpu driver by ensuring pci_dev_put() is called appropriately in amdgpu_device_resume and suspend_display_audio functions.