{"id":"CVE-2024-26894","summary":"ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()\n\nAfter unregistering the CPU idle device, the memory associated with\nit is not freed, leading to a memory leak:\n\nunreferenced object 0xffff896282f6c000 (size 1024):\n  comm \"swapper/0\", pid 1, jiffies 4294893170\n  hex dump (first 32 bytes):\n    00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace (crc 8836a742):\n    [\u003cffffffff993495ed\u003e] kmalloc_trace+0x29d/0x340\n    [\u003cffffffff9972f3b3\u003e] acpi_processor_power_init+0xf3/0x1c0\n    [\u003cffffffff9972d263\u003e] __acpi_processor_start+0xd3/0xf0\n    [\u003cffffffff9972d2bc\u003e] acpi_processor_start+0x2c/0x50\n    [\u003cffffffff99805872\u003e] really_probe+0xe2/0x480\n    [\u003cffffffff99805c98\u003e] __driver_probe_device+0x78/0x160\n    [\u003cffffffff99805daf\u003e] driver_probe_device+0x1f/0x90\n    [\u003cffffffff9980601e\u003e] __driver_attach+0xce/0x1c0\n    [\u003cffffffff99803170\u003e] bus_for_each_dev+0x70/0xc0\n    [\u003cffffffff99804822\u003e] bus_add_driver+0x112/0x210\n    [\u003cffffffff99807245\u003e] driver_register+0x55/0x100\n    [\u003cffffffff9aee4acb\u003e] acpi_processor_driver_init+0x3b/0xc0\n    [\u003cffffffff990012d1\u003e] do_one_initcall+0x41/0x300\n    [\u003cffffffff9ae7c4b0\u003e] kernel_init_freeable+0x320/0x470\n    [\u003cffffffff99b231f6\u003e] kernel_init+0x16/0x1b0\n    [\u003cffffffff99042e6d\u003e] ret_from_fork+0x2d/0x50\n\nFix this by freeing the CPU idle device after unregistering it.","modified":"2026-04-02T10:06:22.969612Z","published":"2024-04-17T10:27:45.960Z","related":["ALSA-2024:7000","ALSA-2024:7001","SUSE-SU-2024:2008-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2360-1","SUSE-SU-2024:2381-1","SUSE-SU-2024:2561-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26894.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1cbaf4c793b0808532f4e7b40bc4be7cec2c78f2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3d48e5be107429ff5d824e7f2a00d1b610d36fbc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8d14a4d0afb49a5b8535d414c782bb334860e73e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c2a30c81bf3cb9033fa9f5305baf7c377075e2e5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cd5c2d0b09d5b6d3f0a7bbabe6761a4997e9dee9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d351bcadab6caa6d8ce7159ff4b77e2da35c09fa"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e18afcb7b2a12b635ac10081f943fcf84ddacc51"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ea96bf3f80625cddba1391a87613356b1b45716d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fad9bcd4d754cc689c19dc04d2c44b82c1a5d6c8"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26894.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26894"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3d339dcbb56d8d70c1b959aff87d74adc3a84eea"},{"fixed":"d351bcadab6caa6d8ce7159ff4b77e2da35c09fa"},{"fixed":"ea96bf3f80625cddba1391a87613356b1b45716d"},{"fixed":"c2a30c81bf3cb9033fa9f5305baf7c377075e2e5"},{"fixed":"1cbaf4c793b0808532f4e7b40bc4be7cec2c78f2"},{"fixed":"fad9bcd4d754cc689c19dc04d2c44b82c1a5d6c8"},{"fixed":"3d48e5be107429ff5d824e7f2a00d1b610d36fbc"},{"fixed":"8d14a4d0afb49a5b8535d414c782bb334860e73e"},{"fixed":"cd5c2d0b09d5b6d3f0a7bbabe6761a4997e9dee9"},{"fixed":"e18afcb7b2a12b635ac10081f943fcf84ddacc51"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26894.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H"}]}