CVE-2024-40932

In the Linux kernel, the following vulnerability has been resolved: drm/exynos/vidi: fix memory leak in .get_modes() The duplicated EDID is never freed. Fix it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*

History

28 Aug 2024, 19:48

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/exynos/vidi: corrige la pérdida de memoria en .get_modes() El EDID duplicado nunca se libera. Arreglalo.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/0acc356da8546b5c55aabfc2e2c5caa0ac9b0003 - () https://git.kernel.org/stable/c/0acc356da8546b5c55aabfc2e2c5caa0ac9b0003 - Patch
References () https://git.kernel.org/stable/c/38e3825631b1f314b21e3ade00b5a4d737eb054e - () https://git.kernel.org/stable/c/38e3825631b1f314b21e3ade00b5a4d737eb054e - Patch
References () https://git.kernel.org/stable/c/540ca99729e28dbe902b01039a3b4bd74520a819 - () https://git.kernel.org/stable/c/540ca99729e28dbe902b01039a3b4bd74520a819 - Patch
References () https://git.kernel.org/stable/c/777838c9b571674ef14dbddf671f372265879226 - () https://git.kernel.org/stable/c/777838c9b571674ef14dbddf671f372265879226 - Patch
References () https://git.kernel.org/stable/c/a269c5701244db2722ae0fce5d1854f5d8f31224 - () https://git.kernel.org/stable/c/a269c5701244db2722ae0fce5d1854f5d8f31224 - Patch
References () https://git.kernel.org/stable/c/cb3ac233434dba130281db330c4b15665b2d2c4d - () https://git.kernel.org/stable/c/cb3ac233434dba130281db330c4b15665b2d2c4d - Patch
References () https://git.kernel.org/stable/c/dcba6bedb439581145d8aa6b0925209f23184ae1 - () https://git.kernel.org/stable/c/dcba6bedb439581145d8aa6b0925209f23184ae1 - Patch
References () https://git.kernel.org/stable/c/ebcf81504fef03f701b9711e43fea4fe2d82ebc8 - () https://git.kernel.org/stable/c/ebcf81504fef03f701b9711e43fea4fe2d82ebc8 - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
CWE CWE-401

12 Jul 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2024-08-28 19:48


NVD link : CVE-2024-40932

Mitre link : CVE-2024-40932

CVE.ORG link : CVE-2024-40932


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime