2024-07-14 02:06:08 +00:00

41 lines
1.9 KiB
JSON

{
"id": "CVE-2021-47051",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:40.517",
"lastModified": "2024-02-28T14:06:45.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()\n\npm_runtime_get_sync will increment pm usage counter even it failed.\nForgetting to putting operation will result in reference leak here.\nFix it by replacing it with pm_runtime_resume_and_get to keep usage\ncounter balanced."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: spi: fsl-lpspi: corrige la fuga de referencia de PM en lpspi_prepare_xfer_hardware() pm_runtime_get_sync incrementar\u00e1 el contador de uso de PM incluso si falla. Olvidarse de poner en funcionamiento resultar\u00e1 en una fuga de referencia aqu\u00ed. Solucionelo reemplaz\u00e1ndolo con pm_runtime_resume_and_get para mantener el contador de uso equilibrado."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/4a01ad002d2e03c399af536562693752af7c81b1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/6a2b5cee0d31ab6cc51030c441135b0e31217282",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a03675497970a93fcf25d81d9d92a59c2d7377a7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b8207bfc539cd07d15e753ff2d179c5b61c673b1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ce02e58ddf8658a4c3bed2296f32a5873b3f7cce",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}