跳转到帖子

Debian: CVE-2024-50012: linux, linux-6.1 -- security update

recommended_posts

发布于
  • Members

Debian: CVE-2024-50012: linux, linux-6.1 -- security update

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
10/21/2024
Created
12/03/2024
Added
12/02/2024
Modified
01/28/2025

Description

In the Linux kernel, the following vulnerability has been resolved: cpufreq: Avoid a bad reference count on CPU node In the parse_perf_domain function, if the call to of_parse_phandle_with_args returns an error, then the reference to the CPU device node that was acquired at the start of the function would not be properly decremented. Address this by declaring the variable with the __free(device_node) cleanup attribute.

Solution(s)

  • debian-upgrade-linux
  • debian-upgrade-linux-6-1

References

  • https://attackerkb.com/topics/cve-2024-50012
  • CVE - 2024-50012
  • DSA-5818-1
  • 查看数 693
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…