In the Linux kernel, the following vulnerability has been resolved: spi:
fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()
pm_runtime_get_sync will increment pm usage counter even it failed.
Forgetting to putting operation will result in reference leak here. Fix it
by replacing it with pm_runtime_resume_and_get to keep usage counter
balanced.
Author | Note |
---|---|
Priority reason: Memory leak on unlikely error handling path. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < 5.4.0-77.86 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1051.53 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < 5.4.0-1051.53 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-bluefield | < 5.4.0-1013.16 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gcp | < 5.4.0-1046.49 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-gcp-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gkeop | < 5.4.0-1018.19 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-hwe-5.4 | < any | UNKNOWN |
git.kernel.org/linus/a03675497970a93fcf25d81d9d92a59c2d7377a7 (5.13-rc1)
git.kernel.org/stable/c/4a01ad002d2e03c399af536562693752af7c81b1
git.kernel.org/stable/c/6a2b5cee0d31ab6cc51030c441135b0e31217282
git.kernel.org/stable/c/a03675497970a93fcf25d81d9d92a59c2d7377a7
git.kernel.org/stable/c/b8207bfc539cd07d15e753ff2d179c5b61c673b1
git.kernel.org/stable/c/ce02e58ddf8658a4c3bed2296f32a5873b3f7cce
launchpad.net/bugs/cve/CVE-2021-47051
nvd.nist.gov/vuln/detail/CVE-2021-47051
security-tracker.debian.org/tracker/CVE-2021-47051
www.cve.org/CVERecord?id=CVE-2021-47051