-

CVE-2024-35879

In the Linux kernel, the following vulnerability has been resolved:

of: dynamic: Synchronize of_changeset_destroy() with the devlink removals

In the following sequence:
  1) of_platform_depopulate()
  2) of_overlay_remove()

During the step 1, devices are destroyed and devlinks are removed.
During the step 2, OF nodes are destroyed but
__of_changeset_entry_destroy() can raise warnings related to missing
of_node_put():
  ERROR: memory leak, expected refcount 1 instead of 2 ...

Indeed, during the devlink removals performed at step 1, the removal
itself releasing the device (and the attached of_node) is done by a job
queued in a workqueue and so, it is done asynchronously with respect to
function calls.
When the warning is present, of_node_put() will be called but wrongly
too late from the workqueue job.

In order to be sure that any ongoing devlink removals are done before
the of_node destruction, synchronize the of_changeset_destroy() with the
devlink removals.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 3127b2ee50c424a96eb3559fbb7b43cf0b111c7a
Version d007150b4e15bfcb8d36cfd88a5645d42e44d383
Status affected
Version < 3ee2424107546d882e1ddd75333ca9c32879908c
Version 80dd33cf72d1ab4f0af303f1fa242c6d6c8d328f
Status affected
Version < 7b6df050c45a1ea158fd50bc32a8e1447dd1e951
Version 80dd33cf72d1ab4f0af303f1fa242c6d6c8d328f
Status affected
Version < 801c8b8ec5bfb3519566dff16a5ecd48302fca82
Version 80dd33cf72d1ab4f0af303f1fa242c6d6c8d328f
Status affected
Version < ae6d76e4f06c37a623e357e79d49b17411db6f5c
Version 80dd33cf72d1ab4f0af303f1fa242c6d6c8d328f
Status affected
Version < 8917e7385346bd6584890ed362985c219fe6ae84
Version 80dd33cf72d1ab4f0af303f1fa242c6d6c8d328f
Status affected
Version 252c23915546863685ecc68cb3a39e7e80c6c9d4
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.13
Status affected
Version < 5.13
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.215
Status unaffected
Version <= 5.15.*
Version 5.15.154
Status unaffected
Version <= 6.1.*
Version 6.1.85
Status unaffected
Version <= 6.6.*
Version 6.6.26
Status unaffected
Version <= 6.8.*
Version 6.8.5
Status unaffected
Version <= *
Version 6.9
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.058
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string