Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/radeon: free iio for atombios when driver shutdown Fix below kmemleak when unload radeon driver: unreferenced object 0xffff9f8608ede200 (size 512): comm "systemd-udevd", pid 326, jiffies 4294682822 (age 716.338s) hex dump (first 32 bytes): 00 00 00 00 c4 aa ec aa 14 ab 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000062fadebe>] kmem_cache_alloc_trace+0x2f1/0x500 [<00000000b6883cea>] atom_parse+0x117/0x230 [radeon] [<00000000158c23fd>] radeon_atombios_init+0xab/0x170 [radeon] [<00000000683f672e>] si_init+0x57/0x750 [radeon] [<00000000566cc31f>] radeon_device_init+0x559/0x9c0 [radeon] [<0000000046efabb3>] radeon_driver_load_kms+0xc1/0x1a0 [radeon] [<00000000b5155064>] drm_dev_register+0xdd/0x1d0 [<0000000045fec835>] radeon_pci_probe+0xbd/0x100 [radeon] [<00000000e69ecca3>] pci_device_probe+0xe1/0x160 [<0000000019484b76>] really_probe.part.0+0xc1/0x2c0 [<000000003f2649da>] __driver_probe_device+0x96/0x130 [<00000000231c5bb1>] driver_probe_device+0x24/0xf0 [<0000000000a42377>] __driver_attach+0x77/0x190 [<00000000d7574da6>] bus_for_each_dev+0x7f/0xd0 [<00000000633166d2>] driver_attach+0x1e/0x30 [<00000000313b05b8>] bus_add_driver+0x12c/0x1e0 iio was allocated in atom_index_iio() called by atom_parse(), but it doesn't got released when the dirver is shutdown. Fix this kmemleak by free it in radeon_atombios_fini().

PUBLISHED Reserved 2025-09-17 | Published 2025-10-01 | Updated 2025-10-01 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before cb109cedbba11c33473e6780c256d8442a9e4460
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 9cdb96b55651c92fc949cfd54124406c3c912b6b
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before f9f55fc64928b5e30d78f861c5fc76db9e769ebb
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before ce9e9d3dcbb0d1551ffd1a7f16e7c051f3ba4140
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before cda2f7efbc2d857220dad32e315a54565b285c1c
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 107b8b542bb9dab4cbdc3276c85fbdd7f6782313
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e2791f2f4d1d804e45fa91b14295c326b64c65f1
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 4773fadedca918faec443daaca5e4ea1c0ced144
affected

Default status
affected

4.14.308
unaffected

4.19.276
unaffected

5.4.235
unaffected

5.10.173
unaffected

5.15.99
unaffected

6.1.16
unaffected

6.2.3
unaffected

6.3
unaffected

References

git.kernel.org/...c/cb109cedbba11c33473e6780c256d8442a9e4460

git.kernel.org/...c/9cdb96b55651c92fc949cfd54124406c3c912b6b

git.kernel.org/...c/f9f55fc64928b5e30d78f861c5fc76db9e769ebb

git.kernel.org/...c/ce9e9d3dcbb0d1551ffd1a7f16e7c051f3ba4140

git.kernel.org/...c/cda2f7efbc2d857220dad32e315a54565b285c1c

git.kernel.org/...c/107b8b542bb9dab4cbdc3276c85fbdd7f6782313

git.kernel.org/...c/e2791f2f4d1d804e45fa91b14295c326b64c65f1

git.kernel.org/...c/4773fadedca918faec443daaca5e4ea1c0ced144

cve.org (CVE-2023-53453)

nvd.nist.gov (CVE-2023-53453)

Download JSON