CVE-2022-50868
BaseFortify
Publication date: 2025-12-30
Last updated on: 2025-12-31
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a reference count leak in the Linux kernel's AMD hardware random number generator (hwrng) driver related to PCI devices. Specifically, the function for_each_pci_dev() uses pci_get_device(), which increases the reference count of a pci_dev object. If the loop is broken early and the pci_dev pointer is not NULL, pci_dev_put() must be called to decrease the reference count. The vulnerability is due to missing calls to pci_dev_put() in both normal and error paths, causing a reference count leak.
How can this vulnerability impact me? :
The impact of this vulnerability is a resource leak in the Linux kernel, where PCI device reference counts are not properly decremented. This can lead to increased memory usage or resource exhaustion over time, potentially causing system instability or degraded performance.