{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T14:15:23.643","vulnerabilities":[{"cve":{"id":"CVE-2022-50645","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-12-09T01:16:47.087","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: fix refcount leak in pci_get_dev_wrapper()\n\nAs the comment of pci_get_domain_bus_and_slot() says, it returns\na PCI device with refcount incremented, so it doesn't need to\ncall an extra pci_dev_get() in pci_get_dev_wrapper(), and the PCI\ndevice needs to be put in the error path."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/1adb2583cdbd75f379e3230a43a7412d373d499f","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/2db53c7059167b63cc790366ef1a9e286e71980b","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/3e255dc21031cc1f341584eb99a7f31598bf0be7","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/9c8921555907f4d723f01ed2d859b66f2d14f08e","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/e6e295a434d1c917a017980389aec88bf35cc81b","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/f29c2f57cdf7a57223dcd9fbaa2261faab5234b2","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}