In the Linux kernel, the following vulnerability has been resolved:
perf/x86/intel/uncore: Fix reference count leak in hswephaslimit_sbox()
pcigetdevice() will increase the reference count for the returned 'dev'. We need to call pcidevput() to decrease the reference count. Since 'dev' is only used in pcireadconfigdword(), let's add pcidev_put() right after it.
{ "vanir_signatures": [ { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/events/intel/uncore_snbep.c" }, "deprecated": false, "digest": { "line_hashes": [ "133772565819757167431003107499652674455", "297876356048053237441576296283468613960", "130092707037949059476940555951074220507", "262616920867120583060976099777567491009" ], "threshold": 0.9 }, "id": "CVE-2022-50318-18b44bc0", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1ff9dd6e7071a561f803135c1d684b13c7a7d01d" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/events/intel/uncore_snbep.c", "function": "hswep_has_limit_sbox" }, "deprecated": false, "digest": { "length": 261.0, "function_hash": "144421738539859963975491724148310924590" }, "id": "CVE-2022-50318-396a1786", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bd66877c0b3b42eed0ecee0bd2a2a505c1e54177" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/events/intel/uncore_snbep.c", "function": "hswep_has_limit_sbox" }, "deprecated": false, "digest": { "length": 261.0, "function_hash": "144421738539859963975491724148310924590" }, "id": "CVE-2022-50318-5c1a701f", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1ff9dd6e7071a561f803135c1d684b13c7a7d01d" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/events/intel/uncore_snbep.c", "function": "hswep_has_limit_sbox" }, "deprecated": false, "digest": { "length": 261.0, "function_hash": "144421738539859963975491724148310924590" }, "id": "CVE-2022-50318-66912f5c", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5a96c10a56037db006ba6769307a9731cf6073be" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/events/intel/uncore_snbep.c", "function": "hswep_has_limit_sbox" }, "deprecated": false, "digest": { "length": 261.0, "function_hash": "144421738539859963975491724148310924590" }, "id": "CVE-2022-50318-88e66da8", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3485f197518061371568f842405159aa9e4df551" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/events/intel/uncore_snbep.c" }, "deprecated": false, "digest": { "line_hashes": [ "133772565819757167431003107499652674455", "297876356048053237441576296283468613960", "130092707037949059476940555951074220507", "262616920867120583060976099777567491009" ], "threshold": 0.9 }, "id": "CVE-2022-50318-8bde6191", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3485f197518061371568f842405159aa9e4df551" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/events/intel/uncore_snbep.c" }, "deprecated": false, "digest": { "line_hashes": [ "133772565819757167431003107499652674455", "297876356048053237441576296283468613960", "130092707037949059476940555951074220507", "262616920867120583060976099777567491009" ], "threshold": 0.9 }, "id": "CVE-2022-50318-b274b964", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c0539d5d474ee6fa4ebc41f927a0f98f81244f25" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/events/intel/uncore_snbep.c", "function": "hswep_has_limit_sbox" }, "deprecated": false, "digest": { "length": 261.0, "function_hash": "144421738539859963975491724148310924590" }, "id": "CVE-2022-50318-b9c12661", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c0539d5d474ee6fa4ebc41f927a0f98f81244f25" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "arch/x86/events/intel/uncore_snbep.c", "function": "hswep_has_limit_sbox" }, "deprecated": false, "digest": { "length": 261.0, "function_hash": "144421738539859963975491724148310924590" }, "id": "CVE-2022-50318-bf9de1ae", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e293263248f25c6b8aa1caf7c1103d40aa03311e" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/events/intel/uncore_snbep.c" }, "deprecated": false, "digest": { "line_hashes": [ "133772565819757167431003107499652674455", "297876356048053237441576296283468613960", "130092707037949059476940555951074220507", "262616920867120583060976099777567491009" ], "threshold": 0.9 }, "id": "CVE-2022-50318-d554270b", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e293263248f25c6b8aa1caf7c1103d40aa03311e" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/events/intel/uncore_snbep.c" }, "deprecated": false, "digest": { "line_hashes": [ "133772565819757167431003107499652674455", "297876356048053237441576296283468613960", "130092707037949059476940555951074220507", "262616920867120583060976099777567491009" ], "threshold": 0.9 }, "id": "CVE-2022-50318-dfc804f1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bd66877c0b3b42eed0ecee0bd2a2a505c1e54177" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "arch/x86/events/intel/uncore_snbep.c" }, "deprecated": false, "digest": { "line_hashes": [ "133772565819757167431003107499652674455", "297876356048053237441576296283468613960", "130092707037949059476940555951074220507", "262616920867120583060976099777567491009" ], "threshold": 0.9 }, "id": "CVE-2022-50318-ef10cb9e", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5a96c10a56037db006ba6769307a9731cf6073be" } ] }