CVE-2021-47051

In the Linux kernel, the following vulnerability has been resolved: spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() pm_runtime_get_sync will increment pm usage counter even it failed. Forgetting to putting operation will result in reference leak here. Fix it by replacing it with pm_runtime_resume_and_get to keep usage counter balanced.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

09 Dec 2024, 18:46

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-Other
References () https://git.kernel.org/stable/c/4a01ad002d2e03c399af536562693752af7c81b1 - () https://git.kernel.org/stable/c/4a01ad002d2e03c399af536562693752af7c81b1 - Patch
References () https://git.kernel.org/stable/c/6a2b5cee0d31ab6cc51030c441135b0e31217282 - () https://git.kernel.org/stable/c/6a2b5cee0d31ab6cc51030c441135b0e31217282 - Patch
References () https://git.kernel.org/stable/c/a03675497970a93fcf25d81d9d92a59c2d7377a7 - () https://git.kernel.org/stable/c/a03675497970a93fcf25d81d9d92a59c2d7377a7 - Patch
References () https://git.kernel.org/stable/c/b8207bfc539cd07d15e753ff2d179c5b61c673b1 - () https://git.kernel.org/stable/c/b8207bfc539cd07d15e753ff2d179c5b61c673b1 - Patch
References () https://git.kernel.org/stable/c/ce02e58ddf8658a4c3bed2296f32a5873b3f7cce - () https://git.kernel.org/stable/c/ce02e58ddf8658a4c3bed2296f32a5873b3f7cce - Patch

21 Nov 2024, 06:35

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: spi: fsl-lpspi: corrige la fuga de referencia de PM en lpspi_prepare_xfer_hardware() pm_runtime_get_sync incrementará el contador de uso de PM incluso si falla. Olvidarse de poner en funcionamiento resultará en una fuga de referencia aquí. Solucionelo reemplazándolo con pm_runtime_resume_and_get para mantener el contador de uso equilibrado.
References () https://git.kernel.org/stable/c/4a01ad002d2e03c399af536562693752af7c81b1 - () https://git.kernel.org/stable/c/4a01ad002d2e03c399af536562693752af7c81b1 -
References () https://git.kernel.org/stable/c/6a2b5cee0d31ab6cc51030c441135b0e31217282 - () https://git.kernel.org/stable/c/6a2b5cee0d31ab6cc51030c441135b0e31217282 -
References () https://git.kernel.org/stable/c/a03675497970a93fcf25d81d9d92a59c2d7377a7 - () https://git.kernel.org/stable/c/a03675497970a93fcf25d81d9d92a59c2d7377a7 -
References () https://git.kernel.org/stable/c/b8207bfc539cd07d15e753ff2d179c5b61c673b1 - () https://git.kernel.org/stable/c/b8207bfc539cd07d15e753ff2d179c5b61c673b1 -
References () https://git.kernel.org/stable/c/ce02e58ddf8658a4c3bed2296f32a5873b3f7cce - () https://git.kernel.org/stable/c/ce02e58ddf8658a4c3bed2296f32a5873b3f7cce -

28 Feb 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-28 09:15

Updated : 2024-12-09 18:46


NVD link : CVE-2021-47051

Mitre link : CVE-2021-47051

CVE.ORG link : CVE-2021-47051


JSON object : View

Products Affected

linux

  • linux_kernel