CVE-2023-52730 (GCVE-0-2023-52730)

Vulnerability from cvelistv5 – Published: 2024-05-21 15:22 – Updated: 2025-05-04 07:42
VLAI?
Title
mmc: sdio: fix possible resource leaks in some error paths
Summary
In the Linux kernel, the following vulnerability has been resolved: mmc: sdio: fix possible resource leaks in some error paths If sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can not release the resources, because the sdio function is not presented in these two cases, it won't call of_node_put() or put_device(). To fix these leaks, make sdio_func_present() only control whether device_del() needs to be called or not, then always call of_node_put() and put_device(). In error case in sdio_init_func(), the reference of 'card->dev' is not get, to avoid redundant put in sdio_free_func_cis(), move the get_device() to sdio_alloc_func() and put_device() to sdio_release_func(), it can keep the get/put function be balanced. Without this patch, while doing fault inject test, it can get the following leak reports, after this fix, the leak is gone. unreferenced object 0xffff888112514000 (size 2048): comm "kworker/3:2", pid 65, jiffies 4294741614 (age 124.774s) hex dump (first 32 bytes): 00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff ..o.....`X...... 10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff .@Q......@Q..... backtrace: [<000000009e5931da>] kmalloc_trace+0x21/0x110 [<000000002f839ccb>] mmc_alloc_card+0x38/0xb0 [mmc_core] [<0000000004adcbf6>] mmc_sdio_init_card+0xde/0x170 [mmc_core] [<000000007538fea0>] mmc_attach_sdio+0xcb/0x1b0 [mmc_core] [<00000000d4fdeba7>] mmc_rescan+0x54a/0x640 [mmc_core] unreferenced object 0xffff888112511000 (size 2048): comm "kworker/3:2", pid 65, jiffies 4294741623 (age 124.766s) hex dump (first 32 bytes): 00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff .@Q......X...... 10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff ..Q.......Q..... backtrace: [<000000009e5931da>] kmalloc_trace+0x21/0x110 [<00000000fcbe706c>] sdio_alloc_func+0x35/0x100 [mmc_core] [<00000000c68f4b50>] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core] [<00000000d4fdeba7>] mmc_rescan+0x54a/0x640 [mmc_core]
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5 , < 92ff03c2563c9b57a027c744750f3b7d2f261c58 (git)
Affected: 3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5 , < 5c7858adada31dbed042448cff6997dd6efc472a (git)
Affected: 3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5 , < 761db46b29b496946046d8cb33c7ea6de6bef36e (git)
Affected: 3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5 , < 30716d9f0fa1766e522cf24c8a456244e4fc9931 (git)
Affected: 3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5 , < 1e06cf04239e202248c8fa356bf11449dc73cfbd (git)
Affected: 3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5 , < f855d31bb38d663c3ba672345d7cce9324ba3b72 (git)
Affected: 3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5 , < 605d9fb9556f8f5fb4566f4df1480f280f308ded (git)
Create a notification for this product.
    Linux Linux Affected: 2.6.33
Unaffected: 0 , < 2.6.33 (semver)
Unaffected: 4.14.306 , ≤ 4.14.* (semver)
Unaffected: 4.19.273 , ≤ 4.19.* (semver)
Unaffected: 5.4.232 , ≤ 5.4.* (semver)
Unaffected: 5.10.169 , ≤ 5.10.* (semver)
Unaffected: 5.15.95 , ≤ 5.15.* (semver)
Unaffected: 6.1.13 , ≤ 6.1.* (semver)
Unaffected: 6.2 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T23:11:35.273Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/92ff03c2563c9b57a027c744750f3b7d2f261c58"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/5c7858adada31dbed042448cff6997dd6efc472a"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/761db46b29b496946046d8cb33c7ea6de6bef36e"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/30716d9f0fa1766e522cf24c8a456244e4fc9931"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/1e06cf04239e202248c8fa356bf11449dc73cfbd"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/f855d31bb38d663c3ba672345d7cce9324ba3b72"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/605d9fb9556f8f5fb4566f4df1480f280f308ded"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-52730",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T15:37:41.339440Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:32:56.604Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/mmc/core/sdio_bus.c",
            "drivers/mmc/core/sdio_cis.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "92ff03c2563c9b57a027c744750f3b7d2f261c58",
              "status": "affected",
              "version": "3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5",
              "versionType": "git"
            },
            {
              "lessThan": "5c7858adada31dbed042448cff6997dd6efc472a",
              "status": "affected",
              "version": "3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5",
              "versionType": "git"
            },
            {
              "lessThan": "761db46b29b496946046d8cb33c7ea6de6bef36e",
              "status": "affected",
              "version": "3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5",
              "versionType": "git"
            },
            {
              "lessThan": "30716d9f0fa1766e522cf24c8a456244e4fc9931",
              "status": "affected",
              "version": "3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5",
              "versionType": "git"
            },
            {
              "lessThan": "1e06cf04239e202248c8fa356bf11449dc73cfbd",
              "status": "affected",
              "version": "3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5",
              "versionType": "git"
            },
            {
              "lessThan": "f855d31bb38d663c3ba672345d7cce9324ba3b72",
              "status": "affected",
              "version": "3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5",
              "versionType": "git"
            },
            {
              "lessThan": "605d9fb9556f8f5fb4566f4df1480f280f308ded",
              "status": "affected",
              "version": "3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/mmc/core/sdio_bus.c",
            "drivers/mmc/core/sdio_cis.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.33"
            },
            {
              "lessThan": "2.6.33",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.306",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.273",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.232",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.169",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.95",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.13",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.2",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.306",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.273",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.232",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.169",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.95",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.13",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.2",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdio: fix possible resource leaks in some error paths\n\nIf sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can\nnot release the resources, because the sdio function is not presented\nin these two cases, it won\u0027t call of_node_put() or put_device().\n\nTo fix these leaks, make sdio_func_present() only control whether\ndevice_del() needs to be called or not, then always call of_node_put()\nand put_device().\n\nIn error case in sdio_init_func(), the reference of \u0027card-\u003edev\u0027 is\nnot get, to avoid redundant put in sdio_free_func_cis(), move the\nget_device() to sdio_alloc_func() and put_device() to sdio_release_func(),\nit can keep the get/put function be balanced.\n\nWithout this patch, while doing fault inject test, it can get the\nfollowing leak reports, after this fix, the leak is gone.\n\nunreferenced object 0xffff888112514000 (size 2048):\n  comm \"kworker/3:2\", pid 65, jiffies 4294741614 (age 124.774s)\n  hex dump (first 32 bytes):\n    00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff  ..o.....`X......\n    10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff  .@Q......@Q.....\n  backtrace:\n    [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\n    [\u003c000000002f839ccb\u003e] mmc_alloc_card+0x38/0xb0 [mmc_core]\n    [\u003c0000000004adcbf6\u003e] mmc_sdio_init_card+0xde/0x170 [mmc_core]\n    [\u003c000000007538fea0\u003e] mmc_attach_sdio+0xcb/0x1b0 [mmc_core]\n    [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]\n\nunreferenced object 0xffff888112511000 (size 2048):\n  comm \"kworker/3:2\", pid 65, jiffies 4294741623 (age 124.766s)\n  hex dump (first 32 bytes):\n    00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff  .@Q......X......\n    10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff  ..Q.......Q.....\n  backtrace:\n    [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\n    [\u003c00000000fcbe706c\u003e] sdio_alloc_func+0x35/0x100 [mmc_core]\n    [\u003c00000000c68f4b50\u003e] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core]\n    [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T07:42:06.175Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/92ff03c2563c9b57a027c744750f3b7d2f261c58"
        },
        {
          "url": "https://git.kernel.org/stable/c/5c7858adada31dbed042448cff6997dd6efc472a"
        },
        {
          "url": "https://git.kernel.org/stable/c/761db46b29b496946046d8cb33c7ea6de6bef36e"
        },
        {
          "url": "https://git.kernel.org/stable/c/30716d9f0fa1766e522cf24c8a456244e4fc9931"
        },
        {
          "url": "https://git.kernel.org/stable/c/1e06cf04239e202248c8fa356bf11449dc73cfbd"
        },
        {
          "url": "https://git.kernel.org/stable/c/f855d31bb38d663c3ba672345d7cce9324ba3b72"
        },
        {
          "url": "https://git.kernel.org/stable/c/605d9fb9556f8f5fb4566f4df1480f280f308ded"
        }
      ],
      "title": "mmc: sdio: fix possible resource leaks in some error paths",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-52730",
    "datePublished": "2024-05-21T15:22:56.633Z",
    "dateReserved": "2024-05-21T15:19:24.232Z",
    "dateUpdated": "2025-05-04T07:42:06.175Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/92ff03c2563c9b57a027c744750f3b7d2f261c58\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/5c7858adada31dbed042448cff6997dd6efc472a\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/761db46b29b496946046d8cb33c7ea6de6bef36e\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/30716d9f0fa1766e522cf24c8a456244e4fc9931\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/1e06cf04239e202248c8fa356bf11449dc73cfbd\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/f855d31bb38d663c3ba672345d7cce9324ba3b72\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/605d9fb9556f8f5fb4566f4df1480f280f308ded\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T23:11:35.273Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-52730\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T15:37:41.339440Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:13.664Z\"}}], \"cna\": {\"title\": \"mmc: sdio: fix possible resource leaks in some error paths\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5\", \"lessThan\": \"92ff03c2563c9b57a027c744750f3b7d2f261c58\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5\", \"lessThan\": \"5c7858adada31dbed042448cff6997dd6efc472a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5\", \"lessThan\": \"761db46b29b496946046d8cb33c7ea6de6bef36e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5\", \"lessThan\": \"30716d9f0fa1766e522cf24c8a456244e4fc9931\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5\", \"lessThan\": \"1e06cf04239e202248c8fa356bf11449dc73cfbd\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5\", \"lessThan\": \"f855d31bb38d663c3ba672345d7cce9324ba3b72\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5\", \"lessThan\": \"605d9fb9556f8f5fb4566f4df1480f280f308ded\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/mmc/core/sdio_bus.c\", \"drivers/mmc/core/sdio_cis.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.6.33\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"2.6.33\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.14.306\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.273\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.232\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.169\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.95\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.13\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.2\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/mmc/core/sdio_bus.c\", \"drivers/mmc/core/sdio_cis.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/92ff03c2563c9b57a027c744750f3b7d2f261c58\"}, {\"url\": \"https://git.kernel.org/stable/c/5c7858adada31dbed042448cff6997dd6efc472a\"}, {\"url\": \"https://git.kernel.org/stable/c/761db46b29b496946046d8cb33c7ea6de6bef36e\"}, {\"url\": \"https://git.kernel.org/stable/c/30716d9f0fa1766e522cf24c8a456244e4fc9931\"}, {\"url\": \"https://git.kernel.org/stable/c/1e06cf04239e202248c8fa356bf11449dc73cfbd\"}, {\"url\": \"https://git.kernel.org/stable/c/f855d31bb38d663c3ba672345d7cce9324ba3b72\"}, {\"url\": \"https://git.kernel.org/stable/c/605d9fb9556f8f5fb4566f4df1480f280f308ded\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmmc: sdio: fix possible resource leaks in some error paths\\n\\nIf sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can\\nnot release the resources, because the sdio function is not presented\\nin these two cases, it won\u0027t call of_node_put() or put_device().\\n\\nTo fix these leaks, make sdio_func_present() only control whether\\ndevice_del() needs to be called or not, then always call of_node_put()\\nand put_device().\\n\\nIn error case in sdio_init_func(), the reference of \u0027card-\u003edev\u0027 is\\nnot get, to avoid redundant put in sdio_free_func_cis(), move the\\nget_device() to sdio_alloc_func() and put_device() to sdio_release_func(),\\nit can keep the get/put function be balanced.\\n\\nWithout this patch, while doing fault inject test, it can get the\\nfollowing leak reports, after this fix, the leak is gone.\\n\\nunreferenced object 0xffff888112514000 (size 2048):\\n  comm \\\"kworker/3:2\\\", pid 65, jiffies 4294741614 (age 124.774s)\\n  hex dump (first 32 bytes):\\n    00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff  ..o.....`X......\\n    10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff  .@Q......@Q.....\\n  backtrace:\\n    [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\\n    [\u003c000000002f839ccb\u003e] mmc_alloc_card+0x38/0xb0 [mmc_core]\\n    [\u003c0000000004adcbf6\u003e] mmc_sdio_init_card+0xde/0x170 [mmc_core]\\n    [\u003c000000007538fea0\u003e] mmc_attach_sdio+0xcb/0x1b0 [mmc_core]\\n    [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]\\n\\nunreferenced object 0xffff888112511000 (size 2048):\\n  comm \\\"kworker/3:2\\\", pid 65, jiffies 4294741623 (age 124.766s)\\n  hex dump (first 32 bytes):\\n    00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff  .@Q......X......\\n    10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff  ..Q.......Q.....\\n  backtrace:\\n    [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\\n    [\u003c00000000fcbe706c\u003e] sdio_alloc_func+0x35/0x100 [mmc_core]\\n    [\u003c00000000c68f4b50\u003e] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core]\\n    [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T08:24:35.252Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-52730\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T08:24:35.252Z\", \"dateReserved\": \"2024-05-21T15:19:24.232Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-05-21T15:22:56.633Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…