CVE-2024-44980

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-44980
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-44980.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-44980
Related
Published
2024-09-04T20:15:07Z
Modified
2024-09-18T03:26:38.238377Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Fix opregion leak

Being part o the display, ideally the setup and cleanup would be done by display itself. However this is a bigger refactor that needs to be done on both i915 and xe. For now, just fix the leak:

unreferenced object 0xffff8881a0300008 (size 192): comm "modprobe", pid 4354, jiffies 4295647021 hex dump (first 32 bytes): 00 00 87 27 81 88 ff ff 18 80 9b 00 00 c9 ff ff ...'............ 18 81 9b 00 00 c9 ff ff 00 00 00 00 00 00 00 00 ................ backtrace (crc 99260e31): [<ffffffff823ce65b>] kmemleakalloc+0x4b/0x80 [<ffffffff81493be2>] kmalloctracenoprof+0x312/0x3d0 [<ffffffffa1345679>] intelopregionsetup+0x89/0x700 [xe] [<ffffffffa125bfaf>] xedisplayinitnoirq+0x2f/0x90 [xe] [<ffffffffa1199ec3>] xedeviceprobe+0x7a3/0xbf0 [xe] [<ffffffffa11f3713>] xepciprobe+0x333/0x5b0 [xe] [<ffffffff81af6be8>] localpciprobe+0x48/0xb0 [<ffffffff81af8778>] pcideviceprobe+0xc8/0x280 [<ffffffff81d09048>] reallyprobe+0xf8/0x390 [<ffffffff81d0937a>] _driverprobedevice+0x8a/0x170 [<ffffffff81d09503>] driverprobedevice+0x23/0xb0 [<ffffffff81d097b7>] _driverattach+0xc7/0x190 [<ffffffff81d0628d>] busforeachdev+0x7d/0xd0 [<ffffffff81d0851e>] driverattach+0x1e/0x30 [<ffffffff81d07ac7>] busadddriver+0x117/0x250

(cherry picked from commit 6f4e43a2f771b737d991142ec4f6d4b7ff31fbb4)

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.10.7-1

Affected versions

6.*

6.1.27-1
6.1.37-1
6.1.38-1
6.1.38-2~bpo11+1
6.1.38-2
6.1.38-3
6.1.38-4~bpo11+1
6.1.38-4
6.1.52-1
6.1.55-1~bpo11+1
6.1.55-1
6.1.64-1
6.1.66-1
6.1.67-1
6.1.69-1~bpo11+1
6.1.69-1
6.1.76-1~bpo11+1
6.1.76-1
6.1.82-1
6.1.85-1
6.1.90-1~bpo11+1
6.1.90-1
6.1.94-1~bpo11+1
6.1.94-1
6.1.98-1
6.1.99-1
6.1.106-1
6.1.106-2
6.1.106-3
6.3.1-1~exp1
6.3.2-1~exp1
6.3.4-1~exp1
6.3.5-1~exp1
6.3.7-1~bpo12+1
6.3.7-1
6.3.11-1
6.4~rc6-1~exp1
6.4~rc7-1~exp1
6.4.1-1~exp1
6.4.4-1~bpo12+1
6.4.4-1
6.4.4-2
6.4.4-3~bpo12+1
6.4.4-3
6.4.11-1
6.4.13-1
6.5~rc4-1~exp1
6.5~rc6-1~exp1
6.5~rc7-1~exp1
6.5.1-1~exp1
6.5.3-1~bpo12+1
6.5.3-1
6.5.6-1
6.5.8-1
6.5.10-1~bpo12+1
6.5.10-1
6.5.13-1
6.6.3-1~exp1
6.6.4-1~exp1
6.6.7-1~exp1
6.6.8-1
6.6.9-1
6.6.11-1
6.6.13-1~bpo12+1
6.6.13-1
6.6.15-1
6.6.15-2
6.7-1~exp1
6.7.1-1~exp1
6.7.4-1~exp1
6.7.7-1
6.7.9-1
6.7.9-2
6.7.12-1~bpo12+1
6.7.12-1
6.8.9-1
6.8.11-1
6.8.12-1~bpo12+1
6.8.12-1
6.9.2-1~exp1
6.9.7-1~bpo12+1
6.9.7-1
6.9.8-1
6.9.9-1
6.9.10-1~bpo12+1
6.9.10-1
6.9.11-1
6.9.12-1
6.10-1~exp1
6.10.1-1~exp1
6.10.3-1
6.10.4-1
6.10.6-1~bpo12+1
6.10.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}