CVE-2024-26911

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-26911
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26911.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-26911
Downstream
Published
2024-04-17T15:59:22Z
Modified
2025-10-21T12:37:23.754244Z
Summary
drm/buddy: Fix alloc_range() error handling code
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/buddy: Fix alloc_range() error handling code

Few users have observed display corruption when they boot the machine to KDE Plasma or playing games. We have root caused the problem that whenever alloc_range() couldn't find the required memory blocks the function was returning SUCCESS in some of the corner cases.

The right approach would be if the total allocated size is less than the required size, the function should return -ENOSPC.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0a1844bf0b532d84324453374ad6845f64066c28
Fixed
4b59c3fada06e5e8010ef7700689c71986e667a2
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0a1844bf0b532d84324453374ad6845f64066c28
Fixed
8746c6c9dfa31d269c65dd52ab42fde0720b7d91

Affected versions

v6.*

v6.5
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.7.1
v6.7.2
v6.7.3
v6.7.4
v6.7.5
v6.8-rc1

Database specific

vanir_signatures

[
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "22143123969563585949898894777207040498",
                "221482210318673965229949916464809918508",
                "188185478389766705392268795381623368830",
                "204077527034746490871306565838679375246"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "drivers/gpu/drm/drm_buddy.c"
        },
        "id": "CVE-2024-26911-08ac20f6",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8746c6c9dfa31d269c65dd52ab42fde0720b7d91",
        "signature_type": "Line"
    },
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "function_hash": "208293390899908382809442768677150968827",
            "length": 1369.0
        },
        "target": {
            "function": "__alloc_range",
            "file": "drivers/gpu/drm/drm_buddy.c"
        },
        "id": "CVE-2024-26911-18c9ddbd",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4b59c3fada06e5e8010ef7700689c71986e667a2",
        "signature_type": "Function"
    },
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "22143123969563585949898894777207040498",
                "221482210318673965229949916464809918508",
                "188185478389766705392268795381623368830",
                "204077527034746490871306565838679375246"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "drivers/gpu/drm/drm_buddy.c"
        },
        "id": "CVE-2024-26911-2f9d5070",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4b59c3fada06e5e8010ef7700689c71986e667a2",
        "signature_type": "Line"
    },
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "function_hash": "208293390899908382809442768677150968827",
            "length": 1369.0
        },
        "target": {
            "function": "__alloc_range",
            "file": "drivers/gpu/drm/drm_buddy.c"
        },
        "id": "CVE-2024-26911-9645c4a8",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8746c6c9dfa31d269c65dd52ab42fde0720b7d91",
        "signature_type": "Function"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.6