In the Linux kernel, the following vulnerability has been resolved:
hwmon: (coretemp) fix pci device refcount leak in nv1aramnew()
As comment of pcigetdomainbusandslot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrement the reference count by calling pcidev_put(). So call it after using to avoid refcount leak.
[
{
"signature_type": "Line",
"target": {
"file": "drivers/hwmon/coretemp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2f74cffc7c85f770b1b1833dccb03b8cde3be102",
"digest": {
"line_hashes": [
"175341930925726068012118762143315011207",
"151340897216684541863468341215214992789",
"299595335230244445093018898376753582667",
"172600007252595819725616159181361930193",
"29734688846436049924275256917419826517",
"48982309474763219979663402252082063369",
"6613517157317525803832376494604463993"
],
"threshold": 0.9
},
"id": "CVE-2022-49011-273524b9",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Function",
"target": {
"function": "adjust_tjmax",
"file": "drivers/hwmon/coretemp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bb75a0d1223d43f97089841aecb28a9b4de687a9",
"digest": {
"length": 1669.0,
"function_hash": "51117060466872118020395350811124714919"
},
"id": "CVE-2022-49011-2c4c9e6e",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Line",
"target": {
"file": "drivers/hwmon/coretemp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ea5844f946b1ec5c0b7c115cd7684f34fd48021b",
"digest": {
"line_hashes": [
"175341930925726068012118762143315011207",
"151340897216684541863468341215214992789",
"299595335230244445093018898376753582667",
"172600007252595819725616159181361930193",
"29734688846436049924275256917419826517",
"48982309474763219979663402252082063369",
"6613517157317525803832376494604463993"
],
"threshold": 0.9
},
"id": "CVE-2022-49011-3a593974",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Line",
"target": {
"file": "drivers/hwmon/coretemp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bb75a0d1223d43f97089841aecb28a9b4de687a9",
"digest": {
"line_hashes": [
"226081097756991042101489570171472265953",
"151340897216684541863468341215214992789",
"299595335230244445093018898376753582667",
"172600007252595819725616159181361930193",
"29734688846436049924275256917419826517",
"48982309474763219979663402252082063369",
"6613517157317525803832376494604463993"
],
"threshold": 0.9
},
"id": "CVE-2022-49011-3d34314d",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Line",
"target": {
"file": "drivers/hwmon/coretemp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e035d5a2a6b907cfce9a80c5f442c2e459cd34e",
"digest": {
"line_hashes": [
"175341930925726068012118762143315011207",
"151340897216684541863468341215214992789",
"299595335230244445093018898376753582667",
"172600007252595819725616159181361930193",
"29734688846436049924275256917419826517",
"48982309474763219979663402252082063369",
"6613517157317525803832376494604463993"
],
"threshold": 0.9
},
"id": "CVE-2022-49011-656c406d",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Function",
"target": {
"function": "adjust_tjmax",
"file": "drivers/hwmon/coretemp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f598da27acbeee414679cacd14294db3e273e3d2",
"digest": {
"length": 1691.0,
"function_hash": "232304256498637860995434705170684542910"
},
"id": "CVE-2022-49011-6bfd4a93",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Function",
"target": {
"function": "adjust_tjmax",
"file": "drivers/hwmon/coretemp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e035d5a2a6b907cfce9a80c5f442c2e459cd34e",
"digest": {
"length": 1691.0,
"function_hash": "232304256498637860995434705170684542910"
},
"id": "CVE-2022-49011-7663fbd2",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Function",
"target": {
"function": "adjust_tjmax",
"file": "drivers/hwmon/coretemp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2f74cffc7c85f770b1b1833dccb03b8cde3be102",
"digest": {
"length": 1691.0,
"function_hash": "232304256498637860995434705170684542910"
},
"id": "CVE-2022-49011-8306c298",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Function",
"target": {
"function": "adjust_tjmax",
"file": "drivers/hwmon/coretemp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ea5844f946b1ec5c0b7c115cd7684f34fd48021b",
"digest": {
"length": 1691.0,
"function_hash": "232304256498637860995434705170684542910"
},
"id": "CVE-2022-49011-b49bace0",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Line",
"target": {
"file": "drivers/hwmon/coretemp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f598da27acbeee414679cacd14294db3e273e3d2",
"digest": {
"line_hashes": [
"175341930925726068012118762143315011207",
"151340897216684541863468341215214992789",
"299595335230244445093018898376753582667",
"172600007252595819725616159181361930193",
"29734688846436049924275256917419826517",
"48982309474763219979663402252082063369",
"6613517157317525803832376494604463993"
],
"threshold": 0.9
},
"id": "CVE-2022-49011-bca101be",
"signature_version": "v1",
"deprecated": false
}
]