We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-50021

ice: Fix improper handling of refcount in ice_dpll_init_rclk_pins()



Description

In the Linux kernel, the following vulnerability has been resolved: ice: Fix improper handling of refcount in ice_dpll_init_rclk_pins() This patch addresses a reference count handling issue in the ice_dpll_init_rclk_pins() function. The function calls ice_dpll_get_pins(), which increments the reference count of the relevant resources. However, if the condition WARN_ON((!vsi || !vsi->netdev)) is met, the function currently returns an error without properly releasing the resources acquired by ice_dpll_get_pins(), leading to a reference count leak. To resolve this, the check has been moved to the top of the function. This ensures that the function verifies the state before any resources are acquired, avoiding the need for additional resource management in the error path. This bug was identified by an experimental static analysis tool developed by our team. The tool specializes in analyzing reference count operations and detecting potential issues where resources are not properly managed. In this case, the tool flagged the missing release operation as a potential problem, which led to the development of this patch.

Reserved 2024-10-21 | Published 2024-10-21 | Updated 2024-11-19 | Assigner Linux

Product status

Default status
unaffected

d7999f5ea64b before aefecead9d08
affected

d7999f5ea64b before ccca30a18e36
affected

Default status
affected

6.7
affected

Any version before 6.7
unaffected

6.11.4
unaffected

6.12
unaffected

References

git.kernel.org/...c/aefecead9d08f4a35ab6f51ba2e408d2cef4e31d

git.kernel.org/...c/ccca30a18e36a742e606d5bf0630e75be7711d0a

cve.org (CVE-2024-50021)

nvd.nist.gov (CVE-2024-50021)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-50021

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.