{"id":"CVE-2022-50760","summary":"drm/amdgpu: Fix PCI device refcount leak in amdgpu_atrm_get_bios()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix PCI device refcount leak in amdgpu_atrm_get_bios()\n\nAs comment of pci_get_class() says, it returns a pci_device with its\nrefcount increased and decreased the refcount for the input parameter\n@from if it is not NULL.\n\nIf we break the loop in amdgpu_atrm_get_bios() with 'pdev' not NULL, we\nneed to call pci_dev_put() to decrease the refcount. Add the missing\npci_dev_put() to avoid refcount leak.","modified":"2026-04-02T08:28:45.057317Z","published":"2025-12-24T13:05:52.582Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0473-1","SUSE-SU-2026:0617-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50760.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3360125d721c91d697c71201f18f042ff743e936"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6611feef35c0c8c4d297b28a7fc6ab3a2c47eca7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7c1ddf7c664b5bc91f14b1bdeaa45520ef1760e4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8f2d2badf8ca5e7e7c30d88840b695c8af7286f3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/981024abf5fe605c94d4f906f65d1b3408d628be"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9d4057d0452243917e12eb19f1599c96f2f05b14"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a8b54ad7106c0604c4adc4933138b3557739bce0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ca54639c7752edf1304d92ff4d0c049d4efc9ba0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/da7c78ea9e62bb65273d3ff19a3866ec205bfe18"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50760.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50760"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d38ceaf99ed015f2a0b9af3499791bd3a3daae21"},{"fixed":"6611feef35c0c8c4d297b28a7fc6ab3a2c47eca7"},{"fixed":"da7c78ea9e62bb65273d3ff19a3866ec205bfe18"},{"fixed":"3360125d721c91d697c71201f18f042ff743e936"},{"fixed":"981024abf5fe605c94d4f906f65d1b3408d628be"},{"fixed":"7c1ddf7c664b5bc91f14b1bdeaa45520ef1760e4"},{"fixed":"8f2d2badf8ca5e7e7c30d88840b695c8af7286f3"},{"fixed":"9d4057d0452243917e12eb19f1599c96f2f05b14"},{"fixed":"a8b54ad7106c0604c4adc4933138b3557739bce0"},{"fixed":"ca54639c7752edf1304d92ff4d0c049d4efc9ba0"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50760.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.2.0"},{"fixed":"4.9.337"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.10.0"},{"fixed":"4.14.303"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.270"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.229"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.163"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.86"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.1.0"},{"fixed":"6.1.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50760.json"}}],"schema_version":"1.7.5"}