CVE-2020-36782

In the Linux kernel, the following vulnerability has been resolved: i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails The PM reference count is not expected to be incremented on return in lpi2c_imx_master_enable. However, pm_runtime_get_sync will increment the PM reference count even failed. Forgetting to putting operation will result in a reference leak here. Replace it with pm_runtime_resume_and_get to keep usage counter balanced.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

06 Dec 2024, 18:02

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/278e5bbdb9a94fa063c0f9bcde2479d0b8042462 - () https://git.kernel.org/stable/c/278e5bbdb9a94fa063c0f9bcde2479d0b8042462 - Patch
References () https://git.kernel.org/stable/c/815859cb1d2302e74f11bf6894bceace9ca9eb4a - () https://git.kernel.org/stable/c/815859cb1d2302e74f11bf6894bceace9ca9eb4a - Patch
References () https://git.kernel.org/stable/c/b100650d80cd2292f6c152f5f2943b5944b3e8ce - () https://git.kernel.org/stable/c/b100650d80cd2292f6c152f5f2943b5944b3e8ce - Patch
References () https://git.kernel.org/stable/c/bb300acc867e937edc2a6898e92b21f88e4e4e66 - () https://git.kernel.org/stable/c/bb300acc867e937edc2a6898e92b21f88e4e4e66 - Patch
References () https://git.kernel.org/stable/c/cc49d206414240483bb93ffa3d80243e6a776916 - () https://git.kernel.org/stable/c/cc49d206414240483bb93ffa3d80243e6a776916 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-Other
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

21 Nov 2024, 05:30

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/278e5bbdb9a94fa063c0f9bcde2479d0b8042462 - () https://git.kernel.org/stable/c/278e5bbdb9a94fa063c0f9bcde2479d0b8042462 -
References () https://git.kernel.org/stable/c/815859cb1d2302e74f11bf6894bceace9ca9eb4a - () https://git.kernel.org/stable/c/815859cb1d2302e74f11bf6894bceace9ca9eb4a -
References () https://git.kernel.org/stable/c/b100650d80cd2292f6c152f5f2943b5944b3e8ce - () https://git.kernel.org/stable/c/b100650d80cd2292f6c152f5f2943b5944b3e8ce -
References () https://git.kernel.org/stable/c/bb300acc867e937edc2a6898e92b21f88e4e4e66 - () https://git.kernel.org/stable/c/bb300acc867e937edc2a6898e92b21f88e4e4e66 -
References () https://git.kernel.org/stable/c/cc49d206414240483bb93ffa3d80243e6a776916 - () https://git.kernel.org/stable/c/cc49d206414240483bb93ffa3d80243e6a776916 -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: i2c: imx-lpi2c: corrige la fuga de referencia cuando falla pm_runtime_get_sync No se espera que el recuento de referencias de PM aumente al regresar en lpi2c_imx_master_enable. Sin embargo, pm_runtime_get_sync incrementará el recuento de referencias de PM incluso si falla. Olvidarse de poner en funcionamiento resultará en una fuga de referencia aquí. Reemplácelo con pm_runtime_resume_and_get para mantener el contador de uso equilibrado.

28 Feb 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-28 09:15

Updated : 2024-12-06 18:02


NVD link : CVE-2020-36782

Mitre link : CVE-2020-36782

CVE.ORG link : CVE-2020-36782


JSON object : View

Products Affected

linux

  • linux_kernel