VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2022-50760

CVE-2022-50760

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix PCI device refcount leak in amdgpu_atrm_get_bios()

As comment of pci_get_class() says, it returns a pci_device with its refcount increased and decreased the refcount for the input parameter @from if it is not NULL.

If we break the loop in amdgpu_atrm_get_bios() with 'pdev' not NULL, we need to call pci_dev_put() to decrease the refcount. Add the missing pci_dev_put() to avoid refcount leak.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing pci_dev_put() in amdgpu_atrm_get_bios() causes a PCI device refcount leak, potentially leading to resource exhaustion.

Vulnerability

In the Linux kernel's AMDGPU Direct Rendering Manager (DRM) driver, the function amdgpu_atrm_get_bios() iterates over PCI devices using pci_get_class(). According to the kernel API, pci_get_class() returns a PCI device with its reference count incremented, and it decrements the reference count of the input from parameter if it is not NULL. When the loop breaks with a non-NULL pdev, the function fails to call pci_dev_put() to release the reference, leading to a reference count leak [1].

Exploitation

This vulnerability is triggered during the boot process when the AMDGPU driver attempts to retrieve the Video BIOS (VBIOS) from a PCI device. No special privileges or user interaction are required; the bug occurs automatically in the kernel initialization path. An attacker with local access could potentially exploit the leak by repeatedly triggering the driver initialization, causing the reference count to increase without bound.

Impact

A persistent PCI device reference count leak prevents the kernel from properly releasing the device object cleanup, eventually leading to resource exhaustion. Over time, this can cause system instability, denial of service, or prevent the device from being properly released and re-enumerated. The leak does not directly allow arbitrary code execution but degrades system reliability.

Mitigation

The fix adds the missing pci_dev_put() call before returning from amdgpu_atrm_get_bios(). Patches have been applied to the stable kernel branches as of December 2024 [2][3][4]. Users should update to a kernel version containing the commit to eliminate the leak.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

9

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

9

News mentions

0

No linked articles in our index yet.