CVE-2024-53075

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-53075
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53075.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53075
Downstream
Related
Published
2024-11-19T17:31:39Z
Modified
2025-10-15T04:23:51.108569Z
Summary
riscv: Prevent a bad reference count on CPU nodes
Details

In the Linux kernel, the following vulnerability has been resolved:

riscv: Prevent a bad reference count on CPU nodes

When populating cache leaves we previously fetched the CPU device node at the very beginning. But when ACPI is enabled we go through a specific branch which returns early and does not call 'ofnodeput' for the node that was acquired.

Since we are not using a CPU device node for the ACPI code anyways, we can simply move the initialization of it just passed the ACPI block, and we are guaranteed to have an 'ofnodeput' call for the acquired node. This prevents a bad reference count of the CPU device node.

Moreover, the previous function did not check for errors when acquiring the device node, so a return -ENOENT has been added for that case.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ebccacb0b599fa788a16eff35a7de14621f56804
Fixed
80aec5a855106c668b5978c48e789f010198b832
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
604f32ea6909b0ebb8ab0bf1ab7dc66ee3dc8955
Fixed
303846a3dc275e35fbb556d72f1e356ba669e4f8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
604f32ea6909b0ebb8ab0bf1ab7dc66ee3dc8955
Fixed
37233169a6ea912020c572f870075a63293b786a

Affected versions

v6.*

v6.10
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.11.1
v6.11.2
v6.11.3
v6.11.4
v6.11.5
v6.11.6
v6.12-rc1

Database specific

vanir_signatures

[
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@80aec5a855106c668b5978c48e789f010198b832",
        "signature_version": "v1",
        "target": {
            "file": "arch/riscv/kernel/cacheinfo.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "15789840434488813902631008068059566132",
                "171543592190772115602317171378898223198",
                "233632899585782716958984840372976507650",
                "188193050175027876670957512535107995478",
                "131952518315368278493490078506813162493",
                "64399019202810010619934862963656743578",
                "273512938275897997764245877445530479774",
                "99418405016709375403192651389617267451"
            ]
        },
        "id": "CVE-2024-53075-0613a507"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@303846a3dc275e35fbb556d72f1e356ba669e4f8",
        "signature_version": "v1",
        "target": {
            "function": "populate_cache_leaves",
            "file": "arch/riscv/kernel/cacheinfo.c"
        },
        "digest": {
            "function_hash": "84006650455545237587628070878090488803",
            "length": 1384.0
        },
        "id": "CVE-2024-53075-21c60048"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@80aec5a855106c668b5978c48e789f010198b832",
        "signature_version": "v1",
        "target": {
            "function": "populate_cache_leaves",
            "file": "arch/riscv/kernel/cacheinfo.c"
        },
        "digest": {
            "function_hash": "84006650455545237587628070878090488803",
            "length": 1384.0
        },
        "id": "CVE-2024-53075-8e63d5d7"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@37233169a6ea912020c572f870075a63293b786a",
        "signature_version": "v1",
        "target": {
            "function": "populate_cache_leaves",
            "file": "arch/riscv/kernel/cacheinfo.c"
        },
        "digest": {
            "function_hash": "84006650455545237587628070878090488803",
            "length": 1384.0
        },
        "id": "CVE-2024-53075-a1f41d64"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@37233169a6ea912020c572f870075a63293b786a",
        "signature_version": "v1",
        "target": {
            "file": "arch/riscv/kernel/cacheinfo.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "15789840434488813902631008068059566132",
                "171543592190772115602317171378898223198",
                "233632899585782716958984840372976507650",
                "188193050175027876670957512535107995478",
                "131952518315368278493490078506813162493",
                "64399019202810010619934862963656743578",
                "273512938275897997764245877445530479774",
                "99418405016709375403192651389617267451"
            ]
        },
        "id": "CVE-2024-53075-a3669817"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@303846a3dc275e35fbb556d72f1e356ba669e4f8",
        "signature_version": "v1",
        "target": {
            "file": "arch/riscv/kernel/cacheinfo.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "15789840434488813902631008068059566132",
                "171543592190772115602317171378898223198",
                "233632899585782716958984840372976507650",
                "188193050175027876670957512535107995478",
                "131952518315368278493490078506813162493",
                "64399019202810010619934862963656743578",
                "273512938275897997764245877445530479774",
                "99418405016709375403192651389617267451"
            ]
        },
        "id": "CVE-2024-53075-fecfb707"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.11.0
Fixed
6.11.7