CVE-2024-26912

In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: fix several DMA buffer leaks Nouveau manages GSP-RM DMA buffers with nvkm_gsp_mem objects. Several of these buffers are never dealloced. Some of them can be deallocated right after GSP-RM is initialized, but the rest need to stay until the driver unloads. Also futher bullet-proof these objects by poisoning the buffer and clearing the nvkm_gsp_mem object when it is deallocated. Poisoning the buffer should trigger an error (or crash) from GSP-RM if it tries to access the buffer after we've deallocated it, because we were wrong about when it is safe to deallocate. Finally, change the mem->size field to a size_t because that's the same type that dma_alloc_coherent expects.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

29 Apr 2024, 19:20

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/042b5f83841fbf7ce39474412db3b5e4765a7ea7 - () https://git.kernel.org/stable/c/042b5f83841fbf7ce39474412db3b5e4765a7ea7 - Patch
References () https://git.kernel.org/stable/c/6190d4c08897d748dd25f0b78267a90aa1694e15 - () https://git.kernel.org/stable/c/6190d4c08897d748dd25f0b78267a90aa1694e15 - Patch
CWE CWE-401
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/nouveau: corrige varias fugas del búfer DMA Nouveau administra los buffers DMA GSP-RM con objetos nvkm_gsp_mem. Varios de estos búferes nunca se desasignan. Algunos de ellos se pueden desasignar inmediatamente después de que se inicializa GSP-RM, pero el resto debe permanecer hasta que se descargue el controlador. También proteja aún más estos objetos envenenando el búfer y limpiando el objeto nvkm_gsp_mem cuando se desasigna. El envenenamiento del búfer debería provocar un error (o bloqueo) de GSP-RM si intenta acceder al búfer después de haberlo desasignado, porque nos equivocamos acerca de cuándo es seguro desasignarlo. Finalmente, cambie el campo mem->size a size_t porque es el mismo tipo que espera dma_alloc_coherent.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

17 Apr 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 16:15

Updated : 2024-04-29 19:20


NVD link : CVE-2024-26912

Mitre link : CVE-2024-26912

CVE.ORG link : CVE-2024-26912


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime