CVE-2024-35833: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: dmaengine: fsl-qdma: Fix a memory leak related to the queue command DMA This dma_alloc_coherent() is undone neither in the remove function, nor in the error handling path of fsl_qdma_probe(). Switch to the managed version to fix both issues.
AI Analysis
Technical Summary
CVE-2024-35833 is a medium-severity vulnerability identified in the Linux kernel's dmaengine subsystem, specifically affecting the fsl-qdma driver. The issue arises from a memory leak caused by improper handling of dma_alloc_coherent() allocations. In the affected code paths, the allocated DMA-coherent memory is not freed either in the driver's remove function or in the error handling path of the fsl_qdma_probe() function. This leads to a gradual consumption of system memory resources when the driver is loaded and unloaded or when initialization errors occur. The root cause is the failure to switch to the managed DMA API, which would automatically handle the release of allocated resources, thereby preventing leaks. The vulnerability does not impact confidentiality or integrity but affects availability due to resource exhaustion. The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) indicates that the attack requires local access with low privileges and no user interaction, and the impact is limited to availability. No known exploits are currently reported in the wild. The affected versions correspond to specific Linux kernel commits prior to the fix. The patch involves switching to the managed DMA API to ensure proper cleanup of allocated memory in all code paths.
Potential Impact
For European organizations, this vulnerability could lead to denial-of-service conditions on Linux systems running the affected kernel versions, particularly those using the fsl-qdma driver for DMA operations. Systems experiencing repeated driver reloads or initialization failures may suffer from memory leaks that degrade system performance or cause crashes. This can impact critical infrastructure, servers, embedded devices, or industrial control systems relying on Linux kernels with this driver. While the vulnerability does not allow privilege escalation or data compromise, the availability impact could disrupt business operations, especially in environments where uptime and reliability are critical. Organizations using Linux in embedded or specialized hardware contexts (e.g., telecommunications, manufacturing, or automotive sectors) may be more exposed due to the use of the fsl-qdma driver. The lack of known exploits reduces immediate risk, but the presence of a fix means timely patching is advisable to prevent potential future exploitation or operational issues.
Mitigation Recommendations
European organizations should identify Linux systems running kernel versions that include the vulnerable fsl-qdma driver. They should apply the official Linux kernel patches that switch the driver to use the managed DMA API, which ensures proper resource cleanup. For systems where immediate patching is not feasible, monitoring for abnormal memory usage or system instability related to DMA operations can help detect potential issues. Additionally, limiting local access to trusted users reduces the risk of exploitation since the vulnerability requires local privileges. Organizations should incorporate this fix into their regular kernel update cycles and validate that embedded or specialized devices receive firmware or kernel updates addressing this vulnerability. Where possible, testing updated kernels in staging environments before deployment will help ensure stability. Finally, documenting and auditing driver usage and system logs can assist in early detection of memory leak symptoms.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2024-35833: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: dmaengine: fsl-qdma: Fix a memory leak related to the queue command DMA This dma_alloc_coherent() is undone neither in the remove function, nor in the error handling path of fsl_qdma_probe(). Switch to the managed version to fix both issues.
AI-Powered Analysis
Technical Analysis
CVE-2024-35833 is a medium-severity vulnerability identified in the Linux kernel's dmaengine subsystem, specifically affecting the fsl-qdma driver. The issue arises from a memory leak caused by improper handling of dma_alloc_coherent() allocations. In the affected code paths, the allocated DMA-coherent memory is not freed either in the driver's remove function or in the error handling path of the fsl_qdma_probe() function. This leads to a gradual consumption of system memory resources when the driver is loaded and unloaded or when initialization errors occur. The root cause is the failure to switch to the managed DMA API, which would automatically handle the release of allocated resources, thereby preventing leaks. The vulnerability does not impact confidentiality or integrity but affects availability due to resource exhaustion. The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) indicates that the attack requires local access with low privileges and no user interaction, and the impact is limited to availability. No known exploits are currently reported in the wild. The affected versions correspond to specific Linux kernel commits prior to the fix. The patch involves switching to the managed DMA API to ensure proper cleanup of allocated memory in all code paths.
Potential Impact
For European organizations, this vulnerability could lead to denial-of-service conditions on Linux systems running the affected kernel versions, particularly those using the fsl-qdma driver for DMA operations. Systems experiencing repeated driver reloads or initialization failures may suffer from memory leaks that degrade system performance or cause crashes. This can impact critical infrastructure, servers, embedded devices, or industrial control systems relying on Linux kernels with this driver. While the vulnerability does not allow privilege escalation or data compromise, the availability impact could disrupt business operations, especially in environments where uptime and reliability are critical. Organizations using Linux in embedded or specialized hardware contexts (e.g., telecommunications, manufacturing, or automotive sectors) may be more exposed due to the use of the fsl-qdma driver. The lack of known exploits reduces immediate risk, but the presence of a fix means timely patching is advisable to prevent potential future exploitation or operational issues.
Mitigation Recommendations
European organizations should identify Linux systems running kernel versions that include the vulnerable fsl-qdma driver. They should apply the official Linux kernel patches that switch the driver to use the managed DMA API, which ensures proper resource cleanup. For systems where immediate patching is not feasible, monitoring for abnormal memory usage or system instability related to DMA operations can help detect potential issues. Additionally, limiting local access to trusted users reduces the risk of exploitation since the vulnerability requires local privileges. Organizations should incorporate this fix into their regular kernel update cycles and validate that embedded or specialized devices receive firmware or kernel updates addressing this vulnerability. Where possible, testing updated kernels in staging environments before deployment will help ensure stability. Finally, documenting and auditing driver usage and system logs can assist in early detection of memory leak symptoms.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T12:19:12.349Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d982ac4522896dcbe35c4
Added to database: 5/21/2025, 9:08:58 AM
Last enriched: 6/29/2025, 4:25:12 PM
Last updated: 8/12/2025, 4:14:11 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.