{"id":"CVE-2024-26943","summary":"nouveau/dmem: handle kcalloc() allocation failure","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau/dmem: handle kcalloc() allocation failure\n\nThe kcalloc() in nouveau_dmem_evict_chunk() will return null if\nthe physical memory has run out. As a result, if we dereference\nsrc_pfns, dst_pfns or dma_addrs, the null pointer dereference bugs\nwill happen.\n\nMoreover, the GPU is going away. If the kcalloc() fails, we could not\nevict all pages mapping a chunk. So this patch adds a __GFP_NOFAIL\nflag in kcalloc().\n\nFinally, as there is no need to have physically contiguous memory,\nthis patch switches kcalloc() to kvcalloc() in order to avoid\nfailing allocations.","modified":"2026-03-20T12:35:18.859871Z","published":"2024-05-01T05:18:00.713Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2135-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2203-1","SUSE-SU-2024:2973-1","SUSE-SU-2024:3984-1","SUSE-SU-2024:3986-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4387-1","SUSE-SU-2025:0556-1","SUSE-SU-2025:0577-1","SUSE-SU-2025:0577-2","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1","SUSE-SU-2025:20249-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26943.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/16e87fe23d4af6df920406494ced5c0f4354567b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2a84744a037b8a511d6a9055f3defddc28ff4a4d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3e82f7383e0b82a835e6b6b06a348b2bc4e2c2ee"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5e81773757a95fc298e96cfd6d4700f07b6192a2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9acfd8b083a0ffbd387566800d89f55058a68af2"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26943.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26943"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"249881232e1471d28b68f9a3829acc14d150cf5d"},{"fixed":"9acfd8b083a0ffbd387566800d89f55058a68af2"},{"fixed":"2a84744a037b8a511d6a9055f3defddc28ff4a4d"},{"fixed":"5e81773757a95fc298e96cfd6d4700f07b6192a2"},{"fixed":"3e82f7383e0b82a835e6b6b06a348b2bc4e2c2ee"},{"fixed":"16e87fe23d4af6df920406494ced5c0f4354567b"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26943.json"}}],"schema_version":"1.7.5"}