CVE-2024-26912

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-26912
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26912.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-26912
Downstream
Published
2024-04-17T15:59:23.223Z
Modified
2025-12-05T04:04:32.081711Z
Summary
drm/nouveau: fix several DMA buffer leaks
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: fix several DMA buffer leaks

Nouveau manages GSP-RM DMA buffers with nvkmgspmem objects. Several of these buffers are never dealloced. Some of them can be deallocated right after GSP-RM is initialized, but the rest need to stay until the driver unloads.

Also futher bullet-proof these objects by poisoning the buffer and clearing the nvkmgspmem object when it is deallocated. Poisoning the buffer should trigger an error (or crash) from GSP-RM if it tries to access the buffer after we've deallocated it, because we were wrong about when it is safe to deallocate.

Finally, change the mem->size field to a sizet because that's the same type that dmaalloc_coherent expects.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26912.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
176fdcbddfd288408ce8571c1760ad618d962096
Fixed
6190d4c08897d748dd25f0b78267a90aa1694e15
Fixed
042b5f83841fbf7ce39474412db3b5e4765a7ea7

Affected versions

v6.*

v6.6
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.7.1
v6.7.2
v6.7.3
v6.7.4
v6.7.5
v6.8-rc1

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.6