drm/bridge: samsung-dsim: Fix memory leak in error path
Summary
| CVE | CVE-2026-43397 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-08 15:16:51 UTC |
| Updated | 2026-05-12 14:10:27 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: drm/bridge: samsung-dsim: Fix memory leak in error path In samsung_dsim_host_attach(), drm_bridge_add() is called to add the bridge. However, if samsung_dsim_register_te_irq() or pdata->host_ops->attach() fails afterwards, the function returns without removing the bridge, causing a memory leak. Fix this by adding proper error handling with goto labels to ensure drm_bridge_remove() is called in all error paths. Also ensure that samsung_dsim_unregister_te_irq() is called if the attach operation fails after the TE IRQ has been registered. samsung_dsim_unregister_te_irq() function is moved without changes to be before samsung_dsim_host_attach() to avoid forward declaration. |
Risk And Classification
EPSS: 0.000180000 probability, percentile 0.049210000 (date 2026-05-11)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected e7447128ca4a250374d6721ee98e3e3cf99551a6 98310fe3a2a79671b739a5344c1a11d74c503e25 git | Not specified |
| CNA | Linux | Linux | affected e7447128ca4a250374d6721ee98e3e3cf99551a6 0b07f7d2c5a4078c2f1c11bb36685084fe4e5c95 git | Not specified |
| CNA | Linux | Linux | affected e7447128ca4a250374d6721ee98e3e3cf99551a6 e6d779654cda63d632bd8dfcdcabd125057e30a5 git | Not specified |
| CNA | Linux | Linux | affected e7447128ca4a250374d6721ee98e3e3cf99551a6 a40b92fb4b26d4cb1b5e439e55a56db7e79a82d1 git | Not specified |
| CNA | Linux | Linux | affected e7447128ca4a250374d6721ee98e3e3cf99551a6 803ec1faf7c1823e6e3b1f2aaa81be18528c9436 git | Not specified |
| CNA | Linux | Linux | affected 6.4 | Not specified |
| CNA | Linux | Linux | unaffected 6.4 semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.130 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.78 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.19 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.9 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/a40b92fb4b26d4cb1b5e439e55a56db7e79a82d1 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/98310fe3a2a79671b739a5344c1a11d74c503e25 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/e6d779654cda63d632bd8dfcdcabd125057e30a5 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/803ec1faf7c1823e6e3b1f2aaa81be18528c9436 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/0b07f7d2c5a4078c2f1c11bb36685084fe4e5c95 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.