In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Fix memory leak in dm_sw_fini()
After destroying dmub_srv, the memory associated with it is
not freed, causing a memory leak:
unreferenced object 0xffff896302b45800 (size 1024):
  comm "(udev-worker)", pid 222, jiffies 4294894636
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 6265fd77):
    [<ffffffff993495ed>] kmalloc_trace+0x29d/0x340
    [<ffffffffc0ea4a94>] dm_dmub_sw_init+0xb4/0x450 [amdgpu]
    [<ffffffffc0ea4e55>] dm_sw_init+0x15/0x2b0 [amdgpu]
    [<ffffffffc0ba8557>] amdgpu_device_init+0x1417/0x24e0 [amdgpu]
    [<ffffffffc0bab285>] amdgpu_driver_load_kms+0x15/0x190 [amdgpu]
    [<ffffffffc0ba09c7>] amdgpu_pci_probe+0x187/0x4e0 [amdgpu]
    [<ffffffff9968fd1e>] local_pci_probe+0x3e/0x90
    [<ffffffff996918a3>] pci_device_probe+0xc3/0x230
    [<ffffffff99805872>] really_probe+0xe2/0x480
    [<ffffffff99805c98>] __driver_probe_device+0x78/0x160
    [<ffffffff99805daf>] driver_probe_device+0x1f/0x90
    [<ffffffff9980601e>] __driver_attach+0xce/0x1c0
    [<ffffffff99803170>] bus_for_each_dev+0x70/0xc0
    [<ffffffff99804822>] bus_add_driver+0x112/0x210
    [<ffffffff99807245>] driver_register+0x55/0x100
    [<ffffffff990012d1>] do_one_initcall+0x41/0x300
Fix this by freeing dmub_srv after destroying it.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
Configuration 2 (hide)
            
            
  | 
    
History
                    07 Jan 2025, 17:12
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | 
        
        Debian debian Linux
         Debian Linux Linux linux Kernel  | 
|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 5.5  | 
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*  | 
|
| References | () https://git.kernel.org/stable/c/10c6b90e975358c17856a578419dc449887899c2 - Patch | |
| References | () https://git.kernel.org/stable/c/33f649f1b1cea39ed360e6c12bba4fac83118e6e - Patch | |
| References | () https://git.kernel.org/stable/c/541e79265ea7e339a7c4a462feafe9f8f996e04b - Patch | |
| References | () https://git.kernel.org/stable/c/58168005337eabef345a872be3f87d0215ff3b30 - Patch | |
| References | () https://git.kernel.org/stable/c/b49b022f7dfce85eb77d0d987008fde5c01d7857 - Patch | |
| References | () https://git.kernel.org/stable/c/bae67893578d608e35691dcdfa90c4957debf1d3 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Patch | |
| CWE | CWE-401 | 
21 Nov 2024, 09:03
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
|
| References | () https://git.kernel.org/stable/c/10c6b90e975358c17856a578419dc449887899c2 - | |
| References | () https://git.kernel.org/stable/c/33f649f1b1cea39ed360e6c12bba4fac83118e6e - | |
| References | () https://git.kernel.org/stable/c/541e79265ea7e339a7c4a462feafe9f8f996e04b - | |
| References | () https://git.kernel.org/stable/c/58168005337eabef345a872be3f87d0215ff3b30 - | |
| References | () https://git.kernel.org/stable/c/b49b022f7dfce85eb77d0d987008fde5c01d7857 - | |
| References | () https://git.kernel.org/stable/c/bae67893578d608e35691dcdfa90c4957debf1d3 - | 
05 Nov 2024, 10:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
    
25 Jun 2024, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
|
| Summary | 
        
        
  | 
17 Apr 2024, 10:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-04-17 10:15
Updated : 2025-01-07 17:12
NVD link : CVE-2024-26833
Mitre link : CVE-2024-26833
CVE.ORG link : CVE-2024-26833
JSON object : View
Products Affected
                debian
- debian_linux
 
linux
- linux_kernel
 
CWE
                
                    
                        
                        CWE-401
                        
            Missing Release of Memory after Effective Lifetime
