CVE-2024-26894

Source
https://cve.org/CVERecord?id=CVE-2024-26894
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26894.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-26894
Downstream
Related
Published
2024-04-17T10:27:45.960Z
Modified
2026-03-14T12:30:04.379527Z
Severity
  • 6.0 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()
Details

In the Linux kernel, the following vulnerability has been resolved:

ACPI: processoridle: Fix memory leak in acpiprocessorpowerexit()

After unregistering the CPU idle device, the memory associated with it is not freed, leading to a memory leak:

unreferenced object 0xffff896282f6c000 (size 1024): comm "swapper/0", pid 1, jiffies 4294893170 hex dump (first 32 bytes): 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 8836a742): [<ffffffff993495ed>] kmalloctrace+0x29d/0x340 [<ffffffff9972f3b3>] acpiprocessorpowerinit+0xf3/0x1c0 [<ffffffff9972d263>] __acpiprocessorstart+0xd3/0xf0 [<ffffffff9972d2bc>] acpi_processorstart+0x2c/0x50 [<ffffffff99805872>] reallyprobe+0xe2/0x480 [<ffffffff99805c98>] __driverprobedevice+0x78/0x160 [<ffffffff99805daf>] driverprobedevice+0x1f/0x90 [<ffffffff9980601e>] _driverattach+0xce/0x1c0 [<ffffffff99803170>] busforeachdev+0x70/0xc0 [<ffffffff99804822>] busadddriver+0x112/0x210 [<ffffffff99807245>] driverregister+0x55/0x100 [<ffffffff9aee4acb>] acpiprocessordriverinit+0x3b/0xc0 [<ffffffff990012d1>] dooneinitcall+0x41/0x300 [<ffffffff9ae7c4b0>] kernelinitfreeable+0x320/0x470 [<ffffffff99b231f6>] kernelinit+0x16/0x1b0 [<ffffffff99042e6d>] retfromfork+0x2d/0x50

Fix this by freeing the CPU idle device after unregistering it.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26894.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3d339dcbb56d8d70c1b959aff87d74adc3a84eea
Fixed
d351bcadab6caa6d8ce7159ff4b77e2da35c09fa
Fixed
ea96bf3f80625cddba1391a87613356b1b45716d
Fixed
c2a30c81bf3cb9033fa9f5305baf7c377075e2e5
Fixed
1cbaf4c793b0808532f4e7b40bc4be7cec2c78f2
Fixed
fad9bcd4d754cc689c19dc04d2c44b82c1a5d6c8
Fixed
3d48e5be107429ff5d824e7f2a00d1b610d36fbc
Fixed
8d14a4d0afb49a5b8535d414c782bb334860e73e
Fixed
cd5c2d0b09d5b6d3f0a7bbabe6761a4997e9dee9
Fixed
e18afcb7b2a12b635ac10081f943fcf84ddacc51

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26894.json"