drm/atmel-hlcdc: fix memory leak from the atomic_destroy_state callback
Summary
| CVE | CVE-2026-43269 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-06 12:16:48 UTC |
| Updated | 2026-05-08 19:40:49 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: drm/atmel-hlcdc: fix memory leak from the atomic_destroy_state callback After several commits, the slab memory increases. Some drm_crtc_commit objects are not freed. The atomic_destroy_state callback only put the framebuffer. Use the __drm_atomic_helper_plane_destroy_state() function to put all the objects that are no longer needed. It has been seen after hours of usage of a graphics application or using kmemleak: unreferenced object 0xc63a6580 (size 64): comm "egt_basic", pid 171, jiffies 4294940784 hex dump (first 32 bytes): 40 50 34 c5 01 00 00 00 ff ff ff ff 8c 65 3a c6 @P4..........e:. 8c 65 3a c6 ff ff ff ff 98 65 3a c6 98 65 3a c6 .e:......e:..e:. backtrace (crc c25aa925): kmemleak_alloc+0x34/0x3c __kmalloc_cache_noprof+0x150/0x1a4 drm_atomic_helper_setup_commit+0x1e8/0x7bc drm_atomic_helper_commit+0x3c/0x15c drm_atomic_commit+0xc0/0xf4 drm_atomic_helper_set_config+0x84/0xb8 drm_mode_setcrtc+0x32c/0x810 drm_ioctl+0x20c/0x488 sys_ioctl+0x14c/0xc20 ret_fast_syscall+0x0/0x54 |
Risk And Classification
Primary CVSS: v3.1 5.5 MEDIUM from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Problem Types: CWE-401
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 2389fc1305fc1e2cf8b310a75463fefd3058bf48 6d4e91ab97fda64e8cf9c8881cc3b4da026bd849 git | Not specified |
| CNA | Linux | Linux | affected 2389fc1305fc1e2cf8b310a75463fefd3058bf48 5718d98976ad6b9700e5a6afec67fc47a8a92580 git | Not specified |
| CNA | Linux | Linux | affected 2389fc1305fc1e2cf8b310a75463fefd3058bf48 57fa3487acfa3467405f8506b94682abd96e7393 git | Not specified |
| CNA | Linux | Linux | affected 2389fc1305fc1e2cf8b310a75463fefd3058bf48 ec40702029b08ee8d5f5b03303d64a10e74a957b git | Not specified |
| CNA | Linux | Linux | affected 2389fc1305fc1e2cf8b310a75463fefd3058bf48 25e832a7830740e72103eb0b527680a4b64bbcb3 git | Not specified |
| CNA | Linux | Linux | affected 2389fc1305fc1e2cf8b310a75463fefd3058bf48 082271e364a3205598c2e4e6233a9f49ce7941cf git | Not specified |
| CNA | Linux | Linux | affected 2389fc1305fc1e2cf8b310a75463fefd3058bf48 3e64e78f4a70e3f6ac8fe5a7071f08ffd25a2489 git | Not specified |
| CNA | Linux | Linux | affected 2389fc1305fc1e2cf8b310a75463fefd3058bf48 f12352471061df83a36edf54bbb16284793284e4 git | Not specified |
| CNA | Linux | Linux | affected 4.1 | Not specified |
| CNA | Linux | Linux | unaffected 4.1 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.252 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.202 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.165 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.128 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.75 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.16 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.6 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/f12352471061df83a36edf54bbb16284793284e4 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/082271e364a3205598c2e4e6233a9f49ce7941cf | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/3e64e78f4a70e3f6ac8fe5a7071f08ffd25a2489 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/25e832a7830740e72103eb0b527680a4b64bbcb3 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/ec40702029b08ee8d5f5b03303d64a10e74a957b | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/57fa3487acfa3467405f8506b94682abd96e7393 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/5718d98976ad6b9700e5a6afec67fc47a8a92580 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/6d4e91ab97fda64e8cf9c8881cc3b4da026bd849 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.