CVE-2022-50645
Description
In the Linux kernel, the following vulnerability has been resolved:
EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper()
As the comment of pci_get_domain_bus_and_slot() says, it returns a PCI device with refcount incremented, so it doesn't need to call an extra pci_dev_get() in pci_get_dev_wrapper(), and the PCI device needs to be put in the error path.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2022-50645 is a refcount leak in the Linux kernel's EDAC/i10nm driver that can lead to resource exhaustion.
Vulnerability
Description CVE-2022-50645 is a refcount leak vulnerability in the Linux kernel's EDAC (Error Detection and Correction) driver for Intel 10nm platforms. The bug resides in the pci_get_dev_wrapper() function, which incorrectly increments the reference count of a PCI device returned by pci_get_domain_bus_and_slot(). The function pci_get_domain_bus_and_slot() already returns a PCI device with its reference count incremented, so an additional pci_dev_get() call is unnecessary and causes the refcount to be over-incremented. This extra reference is not properly released in the error path, leading to a permanent reference count leak [1][2].
Exploitation
An attacker with local access or the ability to trigger the EDAC subsystem initialization could exploit this flaw. The vulnerability is triggered during PCI device enumeration within the EDAC driver, specifically when pci_get_dev_wrapper() is called and an error occurs. Each error event will cause the reference count to leak without being decremented. Over time, repeated triggering of this code path can exhaust the available references for the PCI device, potentially leading to denial-of-service conditions or system instability [3].
Impact
The primary impact is a local denial-of-service (DoS) scenario. Because the leaked references prevent the PCI device from being properly released, the system may eventually run out of reference counts, causing subsequent operations on that device to fail. This does not allow arbitrary code execution or privilege escalation, but it can render parts of the EDAC subsystem inoperable and degrade system reliability [2].
Mitigation
The vulnerability was fixed in Linux kernel commits that remove the redundant pci_dev_get() call and ensure proper reference count handling in the error path. The fix is included in stable kernel updates. Users are advised to apply the latest kernel updates from their distribution to remediate this issue [1][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
6e6e295a434d12db53c7059163e255dc210311adb2583cdbdf29c2f57cdf79c8921555907Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/1adb2583cdbd75f379e3230a43a7412d373d499fnvd
- git.kernel.org/stable/c/2db53c7059167b63cc790366ef1a9e286e71980bnvd
- git.kernel.org/stable/c/3e255dc21031cc1f341584eb99a7f31598bf0be7nvd
- git.kernel.org/stable/c/9c8921555907f4d723f01ed2d859b66f2d14f08envd
- git.kernel.org/stable/c/e6e295a434d1c917a017980389aec88bf35cc81bnvd
- git.kernel.org/stable/c/f29c2f57cdf7a57223dcd9fbaa2261faab5234b2nvd
News mentions
0No linked articles in our index yet.