CVE-2020-36781

In the Linux kernel, the following vulnerability has been resolved: i2c: imx: fix reference leak when pm_runtime_get_sync fails In i2c_imx_xfer() and i2c_imx_remove(), the pm reference count is not expected to be incremented on return. However, pm_runtime_get_sync will increment pm reference count even failed. Forgetting to putting operation will result in a reference leak here. Replace it with pm_runtime_resume_and_get to keep usage counter balanced.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

06 Dec 2024, 16:19

Type Values Removed Values Added
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/1ecc0ebc2ebbad4a22a670a07d27a21fa0b59c77 - () https://git.kernel.org/stable/c/1ecc0ebc2ebbad4a22a670a07d27a21fa0b59c77 - Patch
References () https://git.kernel.org/stable/c/3a0cdd336d92c429b51a79bf4f64b17eafa0325d - () https://git.kernel.org/stable/c/3a0cdd336d92c429b51a79bf4f64b17eafa0325d - Patch
References () https://git.kernel.org/stable/c/47ff617217ca6a13194fcb35c6c3a0c57c080693 - () https://git.kernel.org/stable/c/47ff617217ca6a13194fcb35c6c3a0c57c080693 - Patch
References () https://git.kernel.org/stable/c/ff406f6cd09c273337ab4854292e4aca48f8affd - () https://git.kernel.org/stable/c/ff406f6cd09c273337ab4854292e4aca48f8affd - Patch

21 Nov 2024, 05:30

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: i2c: imx: corrige la fuga de referencia cuando falla pm_runtime_get_sync En i2c_imx_xfer() y i2c_imx_remove(), no se espera que el recuento de referencias pm aumente al regresar. Sin embargo, pm_runtime_get_sync incrementará el recuento de referencias de pm incluso si falla. Olvidarse de poner en funcionamiento resultará en una fuga de referencia aquí. Reemplácelo con pm_runtime_resume_and_get para mantener el contador de uso equilibrado.
References () https://git.kernel.org/stable/c/1ecc0ebc2ebbad4a22a670a07d27a21fa0b59c77 - () https://git.kernel.org/stable/c/1ecc0ebc2ebbad4a22a670a07d27a21fa0b59c77 -
References () https://git.kernel.org/stable/c/3a0cdd336d92c429b51a79bf4f64b17eafa0325d - () https://git.kernel.org/stable/c/3a0cdd336d92c429b51a79bf4f64b17eafa0325d -
References () https://git.kernel.org/stable/c/47ff617217ca6a13194fcb35c6c3a0c57c080693 - () https://git.kernel.org/stable/c/47ff617217ca6a13194fcb35c6c3a0c57c080693 -
References () https://git.kernel.org/stable/c/ff406f6cd09c273337ab4854292e4aca48f8affd - () https://git.kernel.org/stable/c/ff406f6cd09c273337ab4854292e4aca48f8affd -

28 Feb 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-28 09:15

Updated : 2024-12-06 16:19


NVD link : CVE-2020-36781

Mitre link : CVE-2020-36781

CVE.ORG link : CVE-2020-36781


JSON object : View

Products Affected

linux

  • linux_kernel