In the Linux kernel, the following vulnerability has been resolved: spi: uniphier: fix reference count leak in uniphier_spi_probe() The issue happens in several error paths in uniphier_spi_probe(). When either dma_get_slave_caps() or devm_spi_register_master() returns an error code, the function forgets to decrease the refcount of both dma_rx
and dma_tx
objects, which may lead to refcount leaks. Fix it by decrementing the reference count of specific objects in those error paths.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | linux | < 5.16.10-1 | linux_5.16.10-1_all.deb |
Debian | 11 | all | linux | < 5.10.103-1 | linux_5.10.103-1_all.deb |
Debian | 10 | all | linux | < 4.19.249-2 | linux_4.19.249-2_all.deb |
Debian | 999 | all | linux | < 5.16.10-1 | linux_5.16.10-1_all.deb |
Debian | 13 | all | linux | < 5.16.10-1 | linux_5.16.10-1_all.deb |