i2c:cadence:修复 pm_runtime_get_sync 失败时的引用泄漏 (CVE-2020-36784)

admin 2024-03-01 10:41:04 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
i2c:cadence:修复 pm_runtime_get_sync 失败时的引用泄漏 (CVE-2020-36784)

CVE编号

CVE-2020-36784

利用情况

暂无

补丁情况

N/A

披露时间

2024-02-28
漏洞描述
In the Linux kernel, the following vulnerability has been resolved: i2c: cadence: fix reference leak when pm_runtime_get_sync fails The PM reference count is not expected to be incremented on return in functions cdns_i2c_master_xfer and cdns_reg_slave. However, pm_runtime_get_sync will increment pm usage counter even failed. Forgetting to putting operation will result in a reference leak here. Replace it with pm_runtime_resume_and_get to keep usage counter balanced.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 debian_11 linux * Up to (excluding) 5.10.38-1
运行在以下环境
系统 debian_12 linux * Up to (excluding) 5.10.38-1
CVSS3评分 N/A
  • 攻击路径 N/A
  • 攻击复杂度 N/A
  • 权限要求 N/A
  • 影响范围 N/A
  • 用户交互 N/A
  • 可用性 N/A
  • 保密性 N/A
  • 完整性 N/A
N/A
CWE-ID 漏洞类型
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  2