In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Fix memory leak in dm_sw_fini()
After destroying dmub_srv, the memory associated with it is
not freed, causing a memory leak:
unreferenced object 0xffff896302b45800 (size 1024):
comm "(udev-worker)", pid 222, jiffies 4294894636
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace (crc 6265fd77):
[<ffffffff993495ed>] kmalloc_trace+0x29d/0x340
[<ffffffffc0ea4a94>] dm_dmub_sw_init+0xb4/0x450 [amdgpu]
[<ffffffffc0ea4e55>] dm_sw_init+0x15/0x2b0 [amdgpu]
[<ffffffffc0ba8557>] amdgpu_device_init+0x1417/0x24e0 [amdgpu]
[<ffffffffc0bab285>] amdgpu_driver_load_kms+0x15/0x190 [amdgpu]
[<ffffffffc0ba09c7>] amdgpu_pci_probe+0x187/0x4e0 [amdgpu]
[<ffffffff9968fd1e>] local_pci_probe+0x3e/0x90
[<ffffffff996918a3>] pci_device_probe+0xc3/0x230
[<ffffffff99805872>] really_probe+0xe2/0x480
[<ffffffff99805c98>] __driver_probe_device+0x78/0x160
[<ffffffff99805daf>] driver_probe_device+0x1f/0x90
[<ffffffff9980601e>] __driver_attach+0xce/0x1c0
[<ffffffff99803170>] bus_for_each_dev+0x70/0xc0
[<ffffffff99804822>] bus_add_driver+0x112/0x210
[<ffffffff99807245>] driver_register+0x55/0x100
[<ffffffff990012d1>] do_one_initcall+0x41/0x300
Fix this by freeing dmub_srv after destroying it.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
07 Jan 2025, 17:12
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-401 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* |
|
First Time |
Debian debian Linux
Debian Linux Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/10c6b90e975358c17856a578419dc449887899c2 - Patch | |
References | () https://git.kernel.org/stable/c/33f649f1b1cea39ed360e6c12bba4fac83118e6e - Patch | |
References | () https://git.kernel.org/stable/c/541e79265ea7e339a7c4a462feafe9f8f996e04b - Patch | |
References | () https://git.kernel.org/stable/c/58168005337eabef345a872be3f87d0215ff3b30 - Patch | |
References | () https://git.kernel.org/stable/c/b49b022f7dfce85eb77d0d987008fde5c01d7857 - Patch | |
References | () https://git.kernel.org/stable/c/bae67893578d608e35691dcdfa90c4957debf1d3 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Patch |
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/10c6b90e975358c17856a578419dc449887899c2 - | |
References | () https://git.kernel.org/stable/c/33f649f1b1cea39ed360e6c12bba4fac83118e6e - | |
References | () https://git.kernel.org/stable/c/541e79265ea7e339a7c4a462feafe9f8f996e04b - | |
References | () https://git.kernel.org/stable/c/58168005337eabef345a872be3f87d0215ff3b30 - | |
References | () https://git.kernel.org/stable/c/b49b022f7dfce85eb77d0d987008fde5c01d7857 - | |
References | () https://git.kernel.org/stable/c/bae67893578d608e35691dcdfa90c4957debf1d3 - |
05 Nov 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
17 Apr 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-17 10:15
Updated : 2025-01-07 17:12
NVD link : CVE-2024-26833
Mitre link : CVE-2024-26833
CVE.ORG link : CVE-2024-26833
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-401
Missing Release of Memory after Effective Lifetime