Количество 15
Количество 15
CVE-2022-49011
In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrement the reference count by calling pci_dev_put(). So call it after using to avoid refcount leak.
CVE-2022-49011
In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrement the reference count by calling pci_dev_put(). So call it after using to avoid refcount leak.
CVE-2022-49011
In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrement the reference count by calling pci_dev_put(). So call it after using to avoid refcount leak.
CVE-2022-49011
In the Linux kernel, the following vulnerability has been resolved: h ...
GHSA-84x4-gjv7-hm5j
In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrement the reference count by calling pci_dev_put(). So call it after using to avoid refcount leak.
BDU:2025-04437
Уязвимость функции adjust_tjmax() модуля drivers/hwmon/coretemp.c - драйвера мониторинга оборудования ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.
ELSA-2025-7531
ELSA-2025-7531: kernel security update (IMPORTANT)
SUSE-SU-2024:4313-1
Security update for the Linux Kernel
ROS-20250213-01
Множественные уязвимости kernel-lt
SUSE-SU-2024:4131-1
Security update for the Linux Kernel
SUSE-SU-2025:0034-1
Security update for the Linux Kernel
SUSE-SU-2024:4100-1
Security update for the Linux Kernel
SUSE-SU-2024:3983-1
Security update for the Linux Kernel
SUSE-SU-2024:3985-1
Security update for the Linux Kernel
SUSE-SU-2024:4364-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-49011 In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrement the reference count by calling pci_dev_put(). So call it after using to avoid refcount leak. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2022-49011 In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrement the reference count by calling pci_dev_put(). So call it after using to avoid refcount leak. | CVSS3: 7.1 | 0% Низкий | около 1 года назад | |
CVE-2022-49011 In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrement the reference count by calling pci_dev_put(). So call it after using to avoid refcount leak. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2022-49011 In the Linux kernel, the following vulnerability has been resolved: h ... | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
GHSA-84x4-gjv7-hm5j In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrement the reference count by calling pci_dev_put(). So call it after using to avoid refcount leak. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
BDU:2025-04437 Уязвимость функции adjust_tjmax() модуля drivers/hwmon/coretemp.c - драйвера мониторинга оборудования ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании. | CVSS3: 5.5 | 0% Низкий | почти 3 года назад | |
ELSA-2025-7531 ELSA-2025-7531: kernel security update (IMPORTANT) | 6 месяцев назад | |||
SUSE-SU-2024:4313-1 Security update for the Linux Kernel | 11 месяцев назад | |||
ROS-20250213-01 Множественные уязвимости kernel-lt | CVSS3: 7.8 | 9 месяцев назад | ||
SUSE-SU-2024:4131-1 Security update for the Linux Kernel | 12 месяцев назад | |||
SUSE-SU-2025:0034-1 Security update for the Linux Kernel | 10 месяцев назад | |||
SUSE-SU-2024:4100-1 Security update for the Linux Kernel | 12 месяцев назад | |||
SUSE-SU-2024:3983-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:3985-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:4364-1 Security update for the Linux Kernel | 11 месяцев назад |
Уязвимостей на страницу