Description
In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: samsung-dsim: Fix memory leak in error path

In samsung_dsim_host_attach(), drm_bridge_add() is called to add the
bridge. However, if samsung_dsim_register_te_irq() or
pdata->host_ops->attach() fails afterwards, the function returns
without removing the bridge, causing a memory leak.

Fix this by adding proper error handling with goto labels to ensure
drm_bridge_remove() is called in all error paths. Also ensure that
samsung_dsim_unregister_te_irq() is called if the attach operation
fails after the TE IRQ has been registered.

samsung_dsim_unregister_te_irq() function is moved without changes
to be before samsung_dsim_host_attach() to avoid forward declaration.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the Linux kernel Samsung DSIM bridge driver causes a memory leak when attaching a DSIM host. After the bridge is added, the driver registers a timing‑event IRQ and then attempts a hardware attach operation. If the IRQ registration or the attach fails, the code returns without removing the bridge or unregistering the IRQ, allowing the leaked objects to accumulate. Persisting memory leaks in kernel components can deplete system memory and eventually result in denial‑of‑service or system instability.

Affected Systems

Any Linux kernel that includes the legacy Samsung DSIM bridge code and has not yet incorporated the committed patch is affected. This includes all kernel versions that ship with the drm/bridge:samsung-dsim driver present until the error‑handling fix is applied.

Risk and Exploitability

The CVSS score is not specified in the CVE data and no EPSS score is available. The vulnerability is not listed in the CISA KEV catalog. Exploitation of this flaw would most likely require local privileged access or the ability to interact with the kernel module, as the memory leak is triggered by normal operations of the DSIM bridge such as initializing or switching display modes. Remote exploitation without additional privilege escalation has not been described.

Generated by OpenCVE AI on May 9, 2026 at 04:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest kernel update that contains the Samsung DSIM host attach error‑handling fix.
  • If a kernel update is not immediately available, temporarily disable or unload the samsung_dsim module to stop further leaks until a fixed kernel is deployed.
  • If neither option is possible, consider backporting the patch from the kernel source and rebuilding the kernel.

Generated by OpenCVE AI on May 9, 2026 at 04:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 02:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400

Sat, 09 May 2026 00:15:00 +0000


Fri, 08 May 2026 18:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/bridge: samsung-dsim: Fix memory leak in error path In samsung_dsim_host_attach(), drm_bridge_add() is called to add the bridge. However, if samsung_dsim_register_te_irq() or pdata->host_ops->attach() fails afterwards, the function returns without removing the bridge, causing a memory leak. Fix this by adding proper error handling with goto labels to ensure drm_bridge_remove() is called in all error paths. Also ensure that samsung_dsim_unregister_te_irq() is called if the attach operation fails after the TE IRQ has been registered. samsung_dsim_unregister_te_irq() function is moved without changes to be before samsung_dsim_host_attach() to avoid forward declaration.
Title drm/bridge: samsung-dsim: Fix memory leak in error path
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:21:40.185Z

Reserved: 2026-05-01T14:12:56.007Z

Link: CVE-2026-43397

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:51.117

Modified: 2026-05-08T15:16:51.117

Link: CVE-2026-43397

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43397 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T04:30:17Z

Weaknesses