CVE-2024-53075
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/11/2024
Last modified:
13/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
riscv: Prevent a bad reference count on CPU nodes<br />
<br />
When populating cache leaves we previously fetched the CPU device node<br />
at the very beginning. But when ACPI is enabled we go through a<br />
specific branch which returns early and does not call &#39;of_node_put&#39; for<br />
the node that was acquired.<br />
<br />
Since we are not using a CPU device node for the ACPI code anyways, we<br />
can simply move the initialization of it just passed the ACPI block, and<br />
we are guaranteed to have an &#39;of_node_put&#39; call for the acquired node.<br />
This prevents a bad reference count of the CPU device node.<br />
<br />
Moreover, the previous function did not check for errors when acquiring<br />
the device node, so a return -ENOENT has been added for that case.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



