In the Linux kernel, the following vulnerability has been resolved:
of: dynamic: Synchronize of_changeset_destroy() with the devlink removals
In the following sequence:
1) of_platform_depopulate()
2) of_overlay_remove()
During the step 1, devices are destroyed and devlinks are removed.
During the step 2, OF nodes are destroyed but
__of_changeset_entry_destroy() can raise warnings related to missing
of_node_put():
ERROR: memory leak, expected refcount 1 instead of 2 ...
Indeed, during the devlink removals performed at step 1, the removal
itself releasing the device (and the attached of_node) is done by a job
queued in a workqueue and so, it is done asynchronously with respect to
function calls.
When the warning is present, of_node_put() will be called but wrongly
too late from the workqueue job.
In order to be sure that any ongoing devlink removals are done before
the of_node destruction, synchronize the of_changeset_destroy() with the
devlink removals.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
23 Dec 2025, 19:29
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:5.13:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* |
|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/3127b2ee50c424a96eb3559fbb7b43cf0b111c7a - Patch | |
| References | () https://git.kernel.org/stable/c/3ee2424107546d882e1ddd75333ca9c32879908c - Patch | |
| References | () https://git.kernel.org/stable/c/7b6df050c45a1ea158fd50bc32a8e1447dd1e951 - Patch | |
| References | () https://git.kernel.org/stable/c/801c8b8ec5bfb3519566dff16a5ecd48302fca82 - Patch | |
| References | () https://git.kernel.org/stable/c/8917e7385346bd6584890ed362985c219fe6ae84 - Patch | |
| References | () https://git.kernel.org/stable/c/ae6d76e4f06c37a623e357e79d49b17411db6f5c - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | CWE-401 |
21 Nov 2024, 09:21
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/3127b2ee50c424a96eb3559fbb7b43cf0b111c7a - | |
| References | () https://git.kernel.org/stable/c/3ee2424107546d882e1ddd75333ca9c32879908c - | |
| References | () https://git.kernel.org/stable/c/7b6df050c45a1ea158fd50bc32a8e1447dd1e951 - | |
| References | () https://git.kernel.org/stable/c/801c8b8ec5bfb3519566dff16a5ecd48302fca82 - | |
| References | () https://git.kernel.org/stable/c/8917e7385346bd6584890ed362985c219fe6ae84 - | |
| References | () https://git.kernel.org/stable/c/ae6d76e4f06c37a623e357e79d49b17411db6f5c - |
05 Nov 2024, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Jun 2024, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
19 May 2024, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-19 09:15
Updated : 2025-12-23 19:29
NVD link : CVE-2024-35879
Mitre link : CVE-2024-35879
CVE.ORG link : CVE-2024-35879
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime
