VYPR
Unrated severityNVD Advisory· Published Dec 8, 2025· Updated Apr 15, 2026

CVE-2022-50615

CVE-2022-50615

Description

In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map()

pci_get_device() will increase the reference count for the returned pci_dev, so snr_uncore_get_mc_dev() will return a pci_dev with its reference count increased. We need to call pci_dev_put() to decrease the reference count. Let's add the missing pci_dev_put().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reference count leak in the Linux kernel's Intel uncore driver for Skylake-X/SP systems can lead to resource exhaustion.

Vulnerability

Analysis

In the Linux kernel, a reference count leak was found in the snr_uncore_mmio_map() function within the Intel uncore performance monitoring driver for Skylake-X/SP (SNR) platforms. The function snr_uncore_get_mc_dev() calls pci_get_device(), which increments the reference count of the returned pci_dev structure. However, the code path that maps the MMIO region did not call pci_dev_put() to decrement the reference count after use, causing a leak [1][2].

Exploitation

This vulnerability is a memory/resource leak that occurs during normal operation of the perf uncore subsystem. No special privileges beyond local access are required to trigger the code path; any user or process that causes the uncore driver to map MMIO-map a device will trigger the leak. The attack surface is local, as the driver is part of the kernel and accessible to users with permission to use perf events.

Impact

An attacker with local access could repeatedly trigger the vulnerable code path to exhaust kernel memory or device reference counts, potentially leading to a denial of service (system instability or crash). The leak does not directly allow privilege escalation or data corruption, but resource exhaustion can degrade system availability.

Mitigation

The fix was applied in the Linux kernel stable tree. The commit adds the missing pci_dev_put() call to properly release the device reference. Users should update to a kernel version containing the fix (e.g., commit a67146437b6428069b71a7e5e740a2a2a8e1c40ac9 or dc7f07bc1ebb56a23fd1c4f664db5cbeb8900800) [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

3

Patches

5

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.