In the Linux kernel, the following vulnerability has been resolved:
devres: Fix memory leakage caused by driver API devmfreepercpu()
It will cause memory leakage when use driver API devmfreepercpu() to free memory allocated by devmallocpercpu(), fixed by using devresrelease() instead of devresdestroy() within devmfreepercpu().
[
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/base/devres.c"
},
"digest": {
"line_hashes": [
"267591802094823070884938450779137423708",
"274411767091457725236362501137870640821",
"200010835331958579190606476339208862046",
"143974668020517414680067211688977704274"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b67552d7c61f52f1271031adfa7834545ae99701",
"signature_version": "v1",
"id": "CVE-2024-43871-095c6d78"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/base/devres.c"
},
"digest": {
"line_hashes": [
"267591802094823070884938450779137423708",
"274411767091457725236362501137870640821",
"200010835331958579190606476339208862046",
"143974668020517414680067211688977704274"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b044588a16a978cd891cb3d665dd7ae06850d5bf",
"signature_version": "v1",
"id": "CVE-2024-43871-8b6213ef"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/base/devres.c"
},
"digest": {
"line_hashes": [
"267591802094823070884938450779137423708",
"274411767091457725236362501137870640821",
"200010835331958579190606476339208862046",
"143974668020517414680067211688977704274"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ef56dcdca8f2a53abc3a83d388b8336447533d85",
"signature_version": "v1",
"id": "CVE-2024-43871-98f8ef0e"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/base/devres.c"
},
"digest": {
"line_hashes": [
"267591802094823070884938450779137423708",
"274411767091457725236362501137870640821",
"200010835331958579190606476339208862046",
"143974668020517414680067211688977704274"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@700e8abd65b10792b2f179ce4e858f2ca2880f85",
"signature_version": "v1",
"id": "CVE-2024-43871-c035f7b7"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/base/devres.c"
},
"digest": {
"line_hashes": [
"267591802094823070884938450779137423708",
"274411767091457725236362501137870640821",
"200010835331958579190606476339208862046",
"143974668020517414680067211688977704274"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bd50a974097bb82d52a458bd3ee39fb723129a0c",
"signature_version": "v1",
"id": "CVE-2024-43871-ded999fb"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/base/devres.c"
},
"digest": {
"line_hashes": [
"267591802094823070884938450779137423708",
"274411767091457725236362501137870640821",
"200010835331958579190606476339208862046",
"143974668020517414680067211688977704274"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3047f99caec240a88ccd06197af2868da1af6a96",
"signature_version": "v1",
"id": "CVE-2024-43871-f08b93f8"
}
]