CVE-2024-26912
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/04/2024
Last modified:
29/04/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/nouveau: fix several DMA buffer leaks<br />
<br />
Nouveau manages GSP-RM DMA buffers with nvkm_gsp_mem objects. Several of<br />
these buffers are never dealloced. Some of them can be deallocated<br />
right after GSP-RM is initialized, but the rest need to stay until the<br />
driver unloads.<br />
<br />
Also futher bullet-proof these objects by poisoning the buffer and<br />
clearing the nvkm_gsp_mem object when it is deallocated. Poisoning<br />
the buffer should trigger an error (or crash) from GSP-RM if it tries<br />
to access the buffer after we&#39;ve deallocated it, because we were wrong<br />
about when it is safe to deallocate.<br />
<br />
Finally, change the mem->size field to a size_t because that&#39;s the same<br />
type that dma_alloc_coherent expects.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7.0 (excluding) | 6.7.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



