CVE-2023-52730

Source
https://cve.org/CVERecord?id=CVE-2023-52730
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52730.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52730
Downstream
Related
Published
2024-05-21T15:22:56.633Z
Modified
2026-03-14T12:16:51.199015Z
Summary
mmc: sdio: fix possible resource leaks in some error paths
Details

In the Linux kernel, the following vulnerability has been resolved:

mmc: sdio: fix possible resource leaks in some error paths

If sdioaddfunc() or sdioinitfunc() fails, sdioremovefunc() can not release the resources, because the sdio function is not presented in these two cases, it won't call ofnodeput() or put_device().

To fix these leaks, make sdiofuncpresent() only control whether devicedel() needs to be called or not, then always call ofnodeput() and putdevice().

In error case in sdioinitfunc(), the reference of 'card->dev' is not get, to avoid redundant put in sdiofreefunccis(), move the getdevice() to sdioallocfunc() and putdevice() to sdiorelease_func(), it can keep the get/put function be balanced.

Without this patch, while doing fault inject test, it can get the following leak reports, after this fix, the leak is gone.

unreferenced object 0xffff888112514000 (size 2048): comm "kworker/3:2", pid 65, jiffies 4294741614 (age 124.774s) hex dump (first 32 bytes): 00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff ..o.....`X...... 10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff .@Q......@Q..... backtrace: [<000000009e5931da>] kmalloctrace+0x21/0x110 [<000000002f839ccb>] mmcalloccard+0x38/0xb0 [mmccore] [<0000000004adcbf6>] mmcsdioinitcard+0xde/0x170 [mmccore] [<000000007538fea0>] mmcattachsdio+0xcb/0x1b0 [mmccore] [<00000000d4fdeba7>] mmcrescan+0x54a/0x640 [mmc_core]

unreferenced object 0xffff888112511000 (size 2048): comm "kworker/3:2", pid 65, jiffies 4294741623 (age 124.766s) hex dump (first 32 bytes): 00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff .@Q......X...... 10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff ..Q.......Q..... backtrace: [<000000009e5931da>] kmalloctrace+0x21/0x110 [<00000000fcbe706c>] sdioallocfunc+0x35/0x100 [mmccore] [<00000000c68f4b50>] mmcattachsdio.cold.18+0xb1/0x395 [mmccore] [<00000000d4fdeba7>] mmcrescan+0x54a/0x640 [mmc_core]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52730.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5
Fixed
92ff03c2563c9b57a027c744750f3b7d2f261c58
Fixed
5c7858adada31dbed042448cff6997dd6efc472a
Fixed
761db46b29b496946046d8cb33c7ea6de6bef36e
Fixed
30716d9f0fa1766e522cf24c8a456244e4fc9931
Fixed
1e06cf04239e202248c8fa356bf11449dc73cfbd
Fixed
f855d31bb38d663c3ba672345d7cce9324ba3b72
Fixed
605d9fb9556f8f5fb4566f4df1480f280f308ded

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52730.json"