CVE-2024-50012

medium

Description

In the Linux kernel, the following vulnerability has been resolved: cpufreq: Avoid a bad reference count on CPU node In the parse_perf_domain function, if the call to of_parse_phandle_with_args returns an error, then the reference to the CPU device node that was acquired at the start of the function would not be properly decremented. Address this by declaring the variable with the __free(device_node) cleanup attribute.

References

https://git.kernel.org/stable/c/c0f02536fffbbec71aced36d52a765f8c4493dc2

https://git.kernel.org/stable/c/77f88b17387a017416babf1e6488fa17682287e2

https://git.kernel.org/stable/c/6c3d8387839252f1a0fc6367f314446e4a2ebd0b

https://git.kernel.org/stable/c/47cb1d9278f179df8250304ec41009e3e836a926

https://git.kernel.org/stable/c/0f41f383b5a61a2bf6429a449ebba7fb08179d81

Details

Source: Mitre, NVD

Published: 2024-10-21

Updated: 2024-11-08

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium