First published: Wed Sep 18 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/imagination: Free pvr_vm_gpuva after unlink This caused a measurable memory leak. Although the individual allocations are small, the leaks occurs in a high-usage codepath (remapping or unmapping device memory) so they add up quickly.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.8<6.10.10 | |
Linux Kernel | =6.11-rc1 | |
Linux Kernel | =6.11-rc2 | |
Linux Kernel | =6.11-rc3 | |
Linux Kernel | =6.11-rc4 | |
Linux Kernel | =6.11-rc5 | |
Linux Kernel | =6.11-rc6 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46779 is classified as a medium severity vulnerability due to the potential for a memory leak in the Linux kernel.
To mitigate CVE-2024-46779, users should upgrade to patched versions such as 5.10.223-1, 5.10.226-1, or any version after 6.12.11-1 of the Linux kernel.
CVE-2024-46779 affects Linux kernel versions from 6.8 up to 6.10.10, as well as specific release candidates of 6.11.
Yes, CVE-2024-46779 involves a vulnerability in the Linux kernel's handling of device memory, particularly during remapping or unmapping operations.
If upgrading is not possible, monitor your system for abnormal memory usage, and consider applying additional security measures until an upgrade is feasible.