Description
In the Linux kernel, the following vulnerability has been resolved:

dmaengine: omap-dma: fix dma_pool resource leak in error paths

The dma_pool created by dma_pool_create() is not destroyed when
dma_async_device_register() or of_dma_controller_register() fails,
causing a resource leak in the probe error paths.

Add dma_pool_destroy() in both error paths to properly release the
allocated dma_pool resource.
Published: 2026-01-31
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Resource Leak leading to possible kernel memory exhaustion
Action: Apply Patch
AI Analysis

Impact

A missing cleanup in the DMA engine driver for OMAP devices causes the dma_pool created during device registration to remain allocated when the probe fails. The leak means that repeated failures can gradually consume kernel memory, potentially destabilizing the system or leading to a denial-of-service if the kernel runs out of memory. The flaw originates from improper resource management when dma_async_device_register() or of_dma_controller_register() returns an error.

Affected Systems

The issue affects any Linux kernel that includes the DMA engine implementation for OMAP devices and has not been updated to the patch that adds dma_pool_destroy() in the failure paths. Specific kernel releases are not listed, so all affected kernels without the mitigation should be considered vulnerable.

Risk and Exploitability

The EPSS score is reported as below 1 %, indicating a very low probability that the vulnerability will be actively exploited. It is not listed in the CISA KEV catalog. The attack vector is local to the kernel, as the leak occurs during driver probe on boot or module load. An attacker with sufficient privilege to trigger re‑probe conditions could repeatedly exhaust kernel memory, but the lack of a public exploit and low exploit probability reduce the immediate risk. Nonetheless, the impact on availability warrants timely patching.

Generated by OpenCVE AI on April 18, 2026 at 18:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a kernel version that includes the dma_pool_destroy fix for OMAP DMA engine drivers.
  • Restart the system to ensure the updated driver is loaded and the resource leak no longer occurs.
  • Monitor kernel memory usage and system logs for signs of repeated driver probe failures or memory exhaustion.

Generated by OpenCVE AI on April 18, 2026 at 18:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4475-1 linux security update
Debian DLA Debian DLA DLA-4476-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6126-1 linux security update
Debian DSA Debian DSA DSA-6127-1 linux security update
Ubuntu USN Ubuntu USN USN-8162-1 Linux kernel (NVIDIA Tegra) vulnerabilities
Ubuntu USN Ubuntu USN USN-8180-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-8180-2 Linux kernel (FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-8186-1 Linux kernel (Real-time) vulnerabilities
Ubuntu USN Ubuntu USN USN-8187-1 Linux kernel (NVIDIA) vulnerabilities
Ubuntu USN Ubuntu USN USN-8188-1 Linux kernel (HWE) vulnerabilities
History

Sat, 18 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-573

Fri, 06 Feb 2026 16:45:00 +0000


Mon, 02 Feb 2026 12:15:00 +0000


Sat, 31 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: dmaengine: omap-dma: fix dma_pool resource leak in error paths The dma_pool created by dma_pool_create() is not destroyed when dma_async_device_register() or of_dma_controller_register() fails, causing a resource leak in the probe error paths. Add dma_pool_destroy() in both error paths to properly release the allocated dma_pool resource.
Title dmaengine: omap-dma: fix dma_pool resource leak in error paths
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-02-09T08:37:27.739Z

Reserved: 2026-01-13T15:37:45.942Z

Link: CVE-2026-23033

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-01-31T12:16:06.613

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-23033

cve-icon Redhat

Severity :

Publid Date: 2026-01-31T00:00:00Z

Links: CVE-2026-23033 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:45:05Z

Weaknesses