{"id":"CVE-2022-50718","summary":"drm/amdgpu: fix pci device refcount leak","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix pci device refcount leak\n\nAs comment of pci_get_domain_bus_and_slot() says, it returns\na pci device with refcount increment, when finish using it,\nthe caller must decrement the reference count by calling\npci_dev_put().\n\nSo before returning from amdgpu_device_resume|suspend_display_audio(),\npci_dev_put() is called to avoid refcount leak.","modified":"2026-03-20T11:47:35.600220Z","published":"2025-12-24T12:22:41.971Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50718.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/02105f0b3021ee5853b2fa50853c42f35fc01cfd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3725a8f26bdbc38dfdf545836117f1e069277c91"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b85e285e3d6352b02947fc1b72303673dfacb0aa"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d7352b410471cbebf6350b2990bae82bb0d59a76"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f13661b72a61708cecb06562f8acff068a4f31f7"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50718.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50718"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3f12acc8d6d4b2e62fab8f652d7075a859d80b42"},{"fixed":"3725a8f26bdbc38dfdf545836117f1e069277c91"},{"fixed":"02105f0b3021ee5853b2fa50853c42f35fc01cfd"},{"fixed":"f13661b72a61708cecb06562f8acff068a4f31f7"},{"fixed":"d7352b410471cbebf6350b2990bae82bb0d59a76"},{"fixed":"b85e285e3d6352b02947fc1b72303673dfacb0aa"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50718.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.8.0"},{"fixed":"5.10.163"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.86"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.1.0"},{"fixed":"6.1.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50718.json"}}],"schema_version":"1.7.5"}