In the Linux kernel, the following vulnerability has been resolved: i2c:
imx-lpi2c: fix reference leak when pm_runtime_get_sync fails The PM
reference count is not expected to be incremented on return in
lpi2c_imx_master_enable. However, pm_runtime_get_sync will increment the PM
reference count even failed. Forgetting to putting operation will result in
a reference leak here. Replace it with pm_runtime_resume_and_get to keep
usage counter balanced.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < 5.4.0-77.86 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1051.53 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < 5.4.0-1051.53 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-bluefield | < 5.4.0-1013.16 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gcp | < 5.4.0-1046.49 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-gcp-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gkeop | < 5.4.0-1018.19 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-hwe-5.4 | < any | UNKNOWN |
git.kernel.org/linus/278e5bbdb9a94fa063c0f9bcde2479d0b8042462 (5.13-rc1)
git.kernel.org/stable/c/278e5bbdb9a94fa063c0f9bcde2479d0b8042462
git.kernel.org/stable/c/815859cb1d2302e74f11bf6894bceace9ca9eb4a
git.kernel.org/stable/c/b100650d80cd2292f6c152f5f2943b5944b3e8ce
git.kernel.org/stable/c/bb300acc867e937edc2a6898e92b21f88e4e4e66
git.kernel.org/stable/c/cc49d206414240483bb93ffa3d80243e6a776916
launchpad.net/bugs/cve/CVE-2020-36782
nvd.nist.gov/vuln/detail/CVE-2020-36782
security-tracker.debian.org/tracker/CVE-2020-36782
www.cve.org/CVERecord?id=CVE-2020-36782