vulnerability
Ubuntu: (CVE-2021-47051): linux vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Feb 28, 2024 | Nov 19, 2024 | Jun 26, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Feb 28, 2024
Added
Nov 19, 2024
Modified
Jun 26, 2025
Description
In the Linux kernel, the following vulnerability has been resolved:
spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()
pm_runtime_get_sync will increment pm usage counter even it failed.
Forgetting to putting operation will result in reference leak here.
Fix it by replacing it with pm_runtime_resume_and_get to keep usage
counter balanced.
Solution(s)
no-fix-ubuntu-packageubuntu-upgrade-linuxubuntu-upgrade-linux-awsubuntu-upgrade-linux-aws-5-4ubuntu-upgrade-linux-aws-fipsubuntu-upgrade-linux-azureubuntu-upgrade-linux-azure-5-4ubuntu-upgrade-linux-azure-fipsubuntu-upgrade-linux-bluefieldubuntu-upgrade-linux-fipsubuntu-upgrade-linux-gcpubuntu-upgrade-linux-gcp-5-4ubuntu-upgrade-linux-gcp-fipsubuntu-upgrade-linux-gkeopubuntu-upgrade-linux-hwe-5-4ubuntu-upgrade-linux-kvmubuntu-upgrade-linux-oracleubuntu-upgrade-linux-oracle-5-4ubuntu-upgrade-linux-raspiubuntu-upgrade-linux-raspi-5-4
References
- CVE-2021-47051
- https://attackerkb.com/topics/CVE-2021-47051
- URL-https://git.kernel.org/linus/a03675497970a93fcf25d81d9d92a59c2d7377a7
- URL-https://git.kernel.org/stable/c/4a01ad002d2e03c399af536562693752af7c81b1
- URL-https://git.kernel.org/stable/c/6a2b5cee0d31ab6cc51030c441135b0e31217282
- URL-https://git.kernel.org/stable/c/a03675497970a93fcf25d81d9d92a59c2d7377a7
- URL-https://git.kernel.org/stable/c/b8207bfc539cd07d15e753ff2d179c5b61c673b1
- URL-https://git.kernel.org/stable/c/ce02e58ddf8658a4c3bed2296f32a5873b3f7cce
- URL-https://www.cve.org/CVERecord?id=CVE-2021-47051

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.