U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-26839 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix a memleak in init_credit_return When dma_alloc_coherent fails to allocate dd->cr_base[i].va, init_credit_return should deallocate dd->cr_base and dd->cr_base[i] that allocated before. Or those resources would be never freed and a memleak is triggered.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/2e4f9f20b32658ef3724aa46f7aef4908d2609e3
https://git.kernel.org/stable/c/2e4f9f20b32658ef3724aa46f7aef4908d2609e3
https://git.kernel.org/stable/c/3fa240bb6b2dbb3e7a3ee1440a4889cbb6207eb7
https://git.kernel.org/stable/c/3fa240bb6b2dbb3e7a3ee1440a4889cbb6207eb7
https://git.kernel.org/stable/c/52de5805c147137205662af89ed7e083d656ae25
https://git.kernel.org/stable/c/52de5805c147137205662af89ed7e083d656ae25
https://git.kernel.org/stable/c/809aa64ebff51eb170ee31a95f83b2d21efa32e2
https://git.kernel.org/stable/c/809aa64ebff51eb170ee31a95f83b2d21efa32e2
https://git.kernel.org/stable/c/8412c86e89cc78d8b513cb25cf2157a2adf3670a
https://git.kernel.org/stable/c/8412c86e89cc78d8b513cb25cf2157a2adf3670a
https://git.kernel.org/stable/c/b41d0ade0398007fb746213f09903d52a920e896
https://git.kernel.org/stable/c/b41d0ade0398007fb746213f09903d52a920e896
https://git.kernel.org/stable/c/cecfb90cf71d91e9efebd68b9e9b84661b277cc8
https://git.kernel.org/stable/c/cecfb90cf71d91e9efebd68b9e9b84661b277cc8
https://git.kernel.org/stable/c/f0d857ce31a6bc7a82afcdbadb8f7417d482604b
https://git.kernel.org/stable/c/f0d857ce31a6bc7a82afcdbadb8f7417d482604b
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html

Weakness Enumeration

CWE-ID CWE Name Source

Change History

7 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-26839
NVD Published Date:
04/17/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org