Home

Description

In the Linux kernel, the following vulnerability has been resolved: riscv: Prevent a bad reference count on CPU nodes When populating cache leaves we previously fetched the CPU device node at the very beginning. But when ACPI is enabled we go through a specific branch which returns early and does not call 'of_node_put' for the node that was acquired. Since we are not using a CPU device node for the ACPI code anyways, we can simply move the initialization of it just passed the ACPI block, and we are guaranteed to have an 'of_node_put' call for the acquired node. This prevents a bad reference count of the CPU device node. Moreover, the previous function did not check for errors when acquiring the device node, so a return -ENOENT has been added for that case.

PUBLISHED Reserved 2024-11-19 | Published 2024-11-19 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

ebccacb0b599fa788a16eff35a7de14621f56804 (git) before 80aec5a855106c668b5978c48e789f010198b832
affected

604f32ea6909b0ebb8ab0bf1ab7dc66ee3dc8955 (git) before 303846a3dc275e35fbb556d72f1e356ba669e4f8
affected

604f32ea6909b0ebb8ab0bf1ab7dc66ee3dc8955 (git) before 37233169a6ea912020c572f870075a63293b786a
affected

Default status
affected

6.11
affected

Any version before 6.11
unaffected

6.11.7 (semver)
unaffected

6.12 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/80aec5a855106c668b5978c48e789f010198b832

git.kernel.org/...c/303846a3dc275e35fbb556d72f1e356ba669e4f8

git.kernel.org/...c/37233169a6ea912020c572f870075a63293b786a

cve.org (CVE-2024-53075)

nvd.nist.gov (CVE-2024-53075)

Download JSON