CVE-2024-50012

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-50012
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50012.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50012
Downstream
Related
Published
2024-10-21T18:54:04.377Z
Modified
2025-11-28T02:34:16.592146Z
Summary
cpufreq: Avoid a bad reference count on CPU node
Details

In the Linux kernel, the following vulnerability has been resolved:

cpufreq: Avoid a bad reference count on CPU node

In the parseperfdomain function, if the call to ofparsephandlewithargs returns an error, then the reference to the CPU device node that was acquired at the start of the function would not be properly decremented.

Address this by declaring the variable with the _free(devicenode) cleanup attribute.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50012.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8486a32dd484a7d7ec25295c7439094608f54915
Fixed
6c3d8387839252f1a0fc6367f314446e4a2ebd0b
Fixed
0f41f383b5a61a2bf6429a449ebba7fb08179d81
Fixed
77f88b17387a017416babf1e6488fa17682287e2
Fixed
47cb1d9278f179df8250304ec41009e3e836a926
Fixed
c0f02536fffbbec71aced36d52a765f8c4493dc2

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.0
Fixed
6.1.116
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.55
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.10.14
Type
ECOSYSTEM
Events
Introduced
6.11.0
Fixed
6.11.3