Vulnerabilities > CVE-2024-50012 - Unspecified vulnerability in Linux Kernel
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
In the Linux kernel, the following vulnerability has been resolved: cpufreq: Avoid a bad reference count on CPU node In the parse_perf_domain function, if the call to of_parse_phandle_with_args returns an error, then the reference to the CPU device node that was acquired at the start of the function would not be properly decremented. Address this by declaring the variable with the __free(device_node) cleanup attribute.
Vulnerable Configurations
References
- https://git.kernel.org/stable/c/0f41f383b5a61a2bf6429a449ebba7fb08179d81
- https://git.kernel.org/stable/c/77f88b17387a017416babf1e6488fa17682287e2
- https://git.kernel.org/stable/c/47cb1d9278f179df8250304ec41009e3e836a926
- https://git.kernel.org/stable/c/c0f02536fffbbec71aced36d52a765f8c4493dc2
- https://git.kernel.org/stable/c/6c3d8387839252f1a0fc6367f314446e4a2ebd0b