{"id":"CVE-2022-49011","summary":"hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new()\n\nAs comment of pci_get_domain_bus_and_slot() says, it returns\na pci device with refcount increment, when finish using it,\nthe caller must decrement the reference count by calling\npci_dev_put(). So call it after using to avoid refcount leak.","modified":"2026-04-11T12:43:25.939502Z","published":"2024-10-21T20:06:22.099Z","related":["ALSA-2025:7531","ALSA-2025:7532","SUSE-SU-2024:3983-1","SUSE-SU-2024:3985-1","SUSE-SU-2024:4082-1","SUSE-SU-2024:4100-1","SUSE-SU-2024:4131-1","SUSE-SU-2024:4313-1","SUSE-SU-2024:4317-1","SUSE-SU-2024:4364-1","SUSE-SU-2025:0034-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49011.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0dd1da5a15eeecb2fe4cf131b3216fb455af783c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2f74cffc7c85f770b1b1833dccb03b8cde3be102"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6e035d5a2a6b907cfce9a80c5f442c2e459cd34e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7dec14537c5906b8bf40fd6fd6d9c3850f8df11d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bb75a0d1223d43f97089841aecb28a9b4de687a9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c40db1e5f316792b557d2be37e447c20d9ac4635"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ea5844f946b1ec5c0b7c115cd7684f34fd48021b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f598da27acbeee414679cacd14294db3e273e3d2"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49011.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49011"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"14513ee696a0cd12a19318e433b75a786808adc3"},{"fixed":"bb75a0d1223d43f97089841aecb28a9b4de687a9"},{"fixed":"0dd1da5a15eeecb2fe4cf131b3216fb455af783c"},{"fixed":"2f74cffc7c85f770b1b1833dccb03b8cde3be102"},{"fixed":"ea5844f946b1ec5c0b7c115cd7684f34fd48021b"},{"fixed":"c40db1e5f316792b557d2be37e447c20d9ac4635"},{"fixed":"6e035d5a2a6b907cfce9a80c5f442c2e459cd34e"},{"fixed":"f598da27acbeee414679cacd14294db3e273e3d2"},{"fixed":"7dec14537c5906b8bf40fd6fd6d9c3850f8df11d"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49011.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.14.0"},{"fixed":"4.9.335"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.10.0"},{"fixed":"4.14.301"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.268"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.226"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.158"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.82"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.12"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49011.json"}}],"schema_version":"1.7.5"}