CVE-2024-35833

In the Linux kernel, the following vulnerability has been resolved: dmaengine: fsl-qdma: Fix a memory leak related to the queue command DMA This dma_alloc_coherent() is undone neither in the remove function, nor in the error handling path of fsl_qdma_probe(). Switch to the managed version to fix both issues.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

07 Apr 2025, 19:06

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/15eb996d7d13cb72a16389231945ada8f0fef2c3 - () https://git.kernel.org/stable/c/15eb996d7d13cb72a16389231945ada8f0fef2c3 - Patch
References () https://git.kernel.org/stable/c/198270de9d8eb3b5d5f030825ea303ef95285d24 - () https://git.kernel.org/stable/c/198270de9d8eb3b5d5f030825ea303ef95285d24 - Patch
References () https://git.kernel.org/stable/c/1c75fe450b5200c78f4a102a0eb8e15d8f1ccda8 - () https://git.kernel.org/stable/c/1c75fe450b5200c78f4a102a0eb8e15d8f1ccda8 - Patch
References () https://git.kernel.org/stable/c/25ab4d72eb7cbfa0f3d97a139a9b2bfcaa72dd59 - () https://git.kernel.org/stable/c/25ab4d72eb7cbfa0f3d97a139a9b2bfcaa72dd59 - Patch
References () https://git.kernel.org/stable/c/3aa58cb51318e329d203857f7a191678e60bb714 - () https://git.kernel.org/stable/c/3aa58cb51318e329d203857f7a191678e60bb714 - Patch
References () https://git.kernel.org/stable/c/5cd8a51517ce15edbdcea4fc74c4c127ddaa1bd6 - () https://git.kernel.org/stable/c/5cd8a51517ce15edbdcea4fc74c4c127ddaa1bd6 - Patch
References () https://git.kernel.org/stable/c/ae6769ba51417c1c86fb645812d5bff455eee802 - () https://git.kernel.org/stable/c/ae6769ba51417c1c86fb645812d5bff455eee802 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Debian
Debian debian Linux
Linux
CWE CWE-401

Information

Published : 2024-05-17 14:15

Updated : 2025-04-07 19:06


NVD link : CVE-2024-35833

Mitre link : CVE-2024-35833

CVE.ORG link : CVE-2024-35833


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-401

Missing Release of Memory after Effective Lifetime