CVE-2022-50718
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: fix pci device refcount leak
As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrement the reference count by calling pci_dev_put().
So before returning from amdgpu_device_resume|suspend_display_audio(), pci_dev_put() is called to avoid refcount leak.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's AMD GPU driver, a PCI device reference count leak occurs in amdgpu_device_resume|suspend_display_audio() because pci_dev_put() is not called after pci_get_domain_bus_and_slot().
Root
Cause
CVE-2022-50718 is a reference count leak in the Linux kernel's amdgpu DRM driver. The functions amdgpu_device_resume_display_audio() and amdgpu_device_suspend_display_audio() call pci_get_domain_bus_and_slot() which, as documented, returns a PCI device with an incremented reference count. The caller must eventually call pci_dev_put() to decrement the count. The driver failed to do so before returning from those functions, leading to a leak [1][2].
Attack
Surface
An attacker with local access may trigger the code paths that exercise these functions. In practice, this could be triggered through normal system suspend/resume cycles or power management events that cause the display audio resources to be suspended or resumed. No special privileges beyond the ability to trigger PM events are required.
Impact
Repeatedly entering and exiting these code paths will exhaust the PCI device's reference count, preventing the device from being properly released or unregistered. This is a memory/resource leak that, over time, could lead to resource exhaustion, system instability, or denial-of-service conditions.
Mitigation
Patches have been applied to the Linux kernel stable trees. The fix adds pci_dev_put() calls to balance the reference count [1][2]. Users should update to a kernel version containing the fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
5f13661b72a61d7352b410471b85e285e3d633725a8f26bdb02105f0b3021Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/02105f0b3021ee5853b2fa50853c42f35fc01cfdnvd
- git.kernel.org/stable/c/3725a8f26bdbc38dfdf545836117f1e069277c91nvd
- git.kernel.org/stable/c/b85e285e3d6352b02947fc1b72303673dfacb0aanvd
- git.kernel.org/stable/c/d7352b410471cbebf6350b2990bae82bb0d59a76nvd
- git.kernel.org/stable/c/f13661b72a61708cecb06562f8acff068a4f31f7nvd
News mentions
0No linked articles in our index yet.