CVE-2024-38611

In the Linux kernel, the following vulnerability has been resolved: media: i2c: et8ek8: Don't strip remove function when driver is builtin Using __exit for the remove function results in the remove callback being discarded with CONFIG_VIDEO_ET8EK8=y. When such a device gets unbound (e.g. using sysfs or hotplug), the driver is just removed without the cleanup being performed. This results in resource leaks. Fix it by compiling in the remove callback unconditionally. This also fixes a W=1 modpost warning: WARNING: modpost: drivers/media/i2c/et8ek8/et8ek8: section mismatch in reference: et8ek8_i2c_driver+0x10 (section: .data) -> et8ek8_remove (section: .exit.text)
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Oct 2025, 15:24

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/04d1086a62ac492ebb6bb0c94c1c8cb55f5d1f36 - () https://git.kernel.org/stable/c/04d1086a62ac492ebb6bb0c94c1c8cb55f5d1f36 - Patch
References () https://git.kernel.org/stable/c/43fff07e4b1956d0e5cf23717507e438278ea3d9 - () https://git.kernel.org/stable/c/43fff07e4b1956d0e5cf23717507e438278ea3d9 - Patch
References () https://git.kernel.org/stable/c/545b215736c5c4b354e182d99c578a472ac9bfce - () https://git.kernel.org/stable/c/545b215736c5c4b354e182d99c578a472ac9bfce - Patch
References () https://git.kernel.org/stable/c/904db2ba44ae60641b6378c5013254d09acf5e80 - () https://git.kernel.org/stable/c/904db2ba44ae60641b6378c5013254d09acf5e80 - Patch
References () https://git.kernel.org/stable/c/963523600d9f1e36bc35ba774c2493d6baa4dd8f - () https://git.kernel.org/stable/c/963523600d9f1e36bc35ba774c2493d6baa4dd8f - Patch
References () https://git.kernel.org/stable/c/c1a3803e5bb91c13e9ad582003e4288f67f06cd9 - () https://git.kernel.org/stable/c/c1a3803e5bb91c13e9ad582003e4288f67f06cd9 - Patch
References () https://git.kernel.org/stable/c/ece3fc1c10197052044048bea4f13cfdcf25b416 - () https://git.kernel.org/stable/c/ece3fc1c10197052044048bea4f13cfdcf25b416 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CWE CWE-401
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

10 Apr 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/963523600d9f1e36bc35ba774c2493d6baa4dd8f -
  • () https://git.kernel.org/stable/c/ece3fc1c10197052044048bea4f13cfdcf25b416 -

07 Apr 2025, 09:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/04d1086a62ac492ebb6bb0c94c1c8cb55f5d1f36 -

Information

Published : 2024-06-19 14:15

Updated : 2025-10-03 15:24


NVD link : CVE-2024-38611

Mitre link : CVE-2024-38611

CVE.ORG link : CVE-2024-38611


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime