First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: cpufreq: Avoid a bad reference count on CPU node In the parse_perf_domain function, if the call to of_parse_phandle_with_args returns an error, then the reference to the CPU device node that was acquired at the start of the function would not be properly decremented. Address this by declaring the variable with the __free(device_node) cleanup attribute.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.6.55 | |
Linux Kernel | >=6.7<6.10.14 | |
Linux Kernel | >=6.11<6.11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-50012 is considered to be moderate due to potential reference count issues in the Linux kernel.
To fix CVE-2024-50012, update your Linux kernel to a version that is greater than 6.10.14, less than 6.7, or between 6.11 and 6.11.3.
The affected versions for CVE-2024-50012 include Linux kernel versions up to 6.6.55 as well as versions 6.10.14 and 6.11.3.
CVE-2024-50012 impacts the cpufreq component in the Linux kernel related to CPU node reference counting.
There are currently no details available on mitigations for CVE-2024-50012, making updates to the kernel the primary recommendation.