CVE-2022-48973

In the Linux kernel, the following vulnerability has been resolved: gpio: amd8111: Fix PCI device reference count leak for_each_pci_dev() is implemented by pci_get_device(). The comment of pci_get_device() says that it will increase the reference count for the returned pci_dev and also decrease the reference count for the input pci_dev @from if it is not NULL. If we break for_each_pci_dev() loop with pdev not NULL, we need to call pci_dev_put() to decrease the reference count. Add the missing pci_dev_put() after the 'out' label. Since pci_dev_put() can handle NULL input parameter, there is no problem for the 'Device not found' branch. For the normal path, add pci_dev_put() in amd_gpio_exit().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

25 Oct 2024, 15:35

Type Values Removed Values Added
CWE NVD-CWE-Other
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/48bd5d3801f6b67cc144449d434abbd5043a6d37 - () https://git.kernel.org/stable/c/48bd5d3801f6b67cc144449d434abbd5043a6d37 - Patch
References () https://git.kernel.org/stable/c/5ee6413d3dd972930af787b2c0c7aaeb379fa521 - () https://git.kernel.org/stable/c/5ee6413d3dd972930af787b2c0c7aaeb379fa521 - Patch
References () https://git.kernel.org/stable/c/b2bc053ebbba57a06fa655db5ea796de2edce445 - () https://git.kernel.org/stable/c/b2bc053ebbba57a06fa655db5ea796de2edce445 - Patch
References () https://git.kernel.org/stable/c/e364ce04d8f840478b09eee57b614de7cf1e743e - () https://git.kernel.org/stable/c/e364ce04d8f840478b09eee57b614de7cf1e743e - Patch
References () https://git.kernel.org/stable/c/71d591ef873f9ebb86cd8d053b3caee785b2de6a - () https://git.kernel.org/stable/c/71d591ef873f9ebb86cd8d053b3caee785b2de6a - Patch
References () https://git.kernel.org/stable/c/45fecdb9f658d9c82960c98240bc0770ade19aca - () https://git.kernel.org/stable/c/45fecdb9f658d9c82960c98240bc0770ade19aca - Patch
References () https://git.kernel.org/stable/c/4271515f189bd5fe2ec86b4089dab7cb804625d2 - () https://git.kernel.org/stable/c/4271515f189bd5fe2ec86b4089dab7cb804625d2 - Patch
References () https://git.kernel.org/stable/c/4749c5cc147c9860b96db1e71cc36d1de1bd3f59 - () https://git.kernel.org/stable/c/4749c5cc147c9860b96db1e71cc36d1de1bd3f59 - Patch

21 Oct 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 20:15

Updated : 2024-10-25 15:35


NVD link : CVE-2022-48973

Mitre link : CVE-2022-48973


JSON object : View

Products Affected

linux

  • linux_kernel