We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-53075

riscv: Prevent a bad reference count on CPU nodes



Description

In the Linux kernel, the following vulnerability has been resolved: riscv: Prevent a bad reference count on CPU nodes When populating cache leaves we previously fetched the CPU device node at the very beginning. But when ACPI is enabled we go through a specific branch which returns early and does not call 'of_node_put' for the node that was acquired. Since we are not using a CPU device node for the ACPI code anyways, we can simply move the initialization of it just passed the ACPI block, and we are guaranteed to have an 'of_node_put' call for the acquired node. This prevents a bad reference count of the CPU device node. Moreover, the previous function did not check for errors when acquiring the device node, so a return -ENOENT has been added for that case.

Reserved 2024-11-19 | Published 2024-11-19 | Updated 2025-03-13 | Assigner Linux

Product status

Default status
unaffected

ebccacb0b599fa788a16eff35a7de14621f56804 before 80aec5a855106c668b5978c48e789f010198b832
affected

604f32ea6909b0ebb8ab0bf1ab7dc66ee3dc8955 before 303846a3dc275e35fbb556d72f1e356ba669e4f8
affected

604f32ea6909b0ebb8ab0bf1ab7dc66ee3dc8955 before 37233169a6ea912020c572f870075a63293b786a
affected

Default status
affected

6.11
affected

Any version before 6.11
unaffected

6.11.7
unaffected

6.12
unaffected

References

git.kernel.org/...c/80aec5a855106c668b5978c48e789f010198b832

git.kernel.org/...c/303846a3dc275e35fbb556d72f1e356ba669e4f8

git.kernel.org/...c/37233169a6ea912020c572f870075a63293b786a

cve.org (CVE-2024-53075)

nvd.nist.gov (CVE-2024-53075)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-53075

Support options

Helpdesk Chat, Email, Knowledgebase