CVE-2023-52730 (GCVE-0-2023-52730)

Vulnerability from cvelistv5 – Published: 2024-05-21 15:22 – Updated: 2026-05-11 19:32
VLAI?
Title
mmc: sdio: fix possible resource leaks in some error paths
Summary
In the Linux kernel, the following vulnerability has been resolved: mmc: sdio: fix possible resource leaks in some error paths If sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can not release the resources, because the sdio function is not presented in these two cases, it won't call of_node_put() or put_device(). To fix these leaks, make sdio_func_present() only control whether device_del() needs to be called or not, then always call of_node_put() and put_device(). In error case in sdio_init_func(), the reference of 'card->dev' is not get, to avoid redundant put in sdio_free_func_cis(), move the get_device() to sdio_alloc_func() and put_device() to sdio_release_func(), it can keep the get/put function be balanced. Without this patch, while doing fault inject test, it can get the following leak reports, after this fix, the leak is gone. unreferenced object 0xffff888112514000 (size 2048): comm "kworker/3:2", pid 65, jiffies 4294741614 (age 124.774s) hex dump (first 32 bytes): 00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff ..o.....`X...... 10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff .@Q......@Q..... backtrace: [<000000009e5931da>] kmalloc_trace+0x21/0x110 [<000000002f839ccb>] mmc_alloc_card+0x38/0xb0 [mmc_core] [<0000000004adcbf6>] mmc_sdio_init_card+0xde/0x170 [mmc_core] [<000000007538fea0>] mmc_attach_sdio+0xcb/0x1b0 [mmc_core] [<00000000d4fdeba7>] mmc_rescan+0x54a/0x640 [mmc_core] unreferenced object 0xffff888112511000 (size 2048): comm "kworker/3:2", pid 65, jiffies 4294741623 (age 124.766s) hex dump (first 32 bytes): 00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff .@Q......X...... 10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff ..Q.......Q..... backtrace: [<000000009e5931da>] kmalloc_trace+0x21/0x110 [<00000000fcbe706c>] sdio_alloc_func+0x35/0x100 [mmc_core] [<00000000c68f4b50>] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core] [<00000000d4fdeba7>] mmc_rescan+0x54a/0x640 [mmc_core]
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5 , < 92ff03c2563c9b57a027c744750f3b7d2f261c58 (git)
Affected: 3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5 , < 5c7858adada31dbed042448cff6997dd6efc472a (git)
Affected: 3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5 , < 761db46b29b496946046d8cb33c7ea6de6bef36e (git)
Affected: 3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5 , < 30716d9f0fa1766e522cf24c8a456244e4fc9931 (git)
Affected: 3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5 , < 1e06cf04239e202248c8fa356bf11449dc73cfbd (git)
Affected: 3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5 , < f855d31bb38d663c3ba672345d7cce9324ba3b72 (git)
Affected: 3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5 , < 605d9fb9556f8f5fb4566f4df1480f280f308ded (git)
Create a notification for this product.
Linux Linux Affected: 2.6.33
Unaffected: 0 , < 2.6.33 (semver)
Unaffected: 4.14.306 , ≤ 4.14.* (semver)
Unaffected: 4.19.273 , ≤ 4.19.* (semver)
Unaffected: 5.4.232 , ≤ 5.4.* (semver)
Unaffected: 5.10.169 , ≤ 5.10.* (semver)
Unaffected: 5.15.95 , ≤ 5.15.* (semver)
Unaffected: 6.1.13 , ≤ 6.1.* (semver)
Unaffected: 6.2 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T23:11:35.273Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/92ff03c2563c9b57a027c744750f3b7d2f261c58"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/5c7858adada31dbed042448cff6997dd6efc472a"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/761db46b29b496946046d8cb33c7ea6de6bef36e"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/30716d9f0fa1766e522cf24c8a456244e4fc9931"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/1e06cf04239e202248c8fa356bf11449dc73cfbd"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/f855d31bb38d663c3ba672345d7cce9324ba3b72"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/605d9fb9556f8f5fb4566f4df1480f280f308ded"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-52730",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T15:37:41.339440Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:32:56.604Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/mmc/core/sdio_bus.c",
            "drivers/mmc/core/sdio_cis.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "92ff03c2563c9b57a027c744750f3b7d2f261c58",
              "status": "affected",
              "version": "3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5",
              "versionType": "git"
            },
            {
              "lessThan": "5c7858adada31dbed042448cff6997dd6efc472a",
              "status": "affected",
              "version": "3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5",
              "versionType": "git"
            },
            {
              "lessThan": "761db46b29b496946046d8cb33c7ea6de6bef36e",
              "status": "affected",
              "version": "3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5",
              "versionType": "git"
            },
            {
              "lessThan": "30716d9f0fa1766e522cf24c8a456244e4fc9931",
              "status": "affected",
              "version": "3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5",
              "versionType": "git"
            },
            {
              "lessThan": "1e06cf04239e202248c8fa356bf11449dc73cfbd",
              "status": "affected",
              "version": "3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5",
              "versionType": "git"
            },
            {
              "lessThan": "f855d31bb38d663c3ba672345d7cce9324ba3b72",
              "status": "affected",
              "version": "3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5",
              "versionType": "git"
            },
            {
              "lessThan": "605d9fb9556f8f5fb4566f4df1480f280f308ded",
              "status": "affected",
              "version": "3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/mmc/core/sdio_bus.c",
            "drivers/mmc/core/sdio_cis.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.33"
            },
            {
              "lessThan": "2.6.33",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.306",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.273",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.232",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.169",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.95",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.13",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.2",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.306",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.273",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.232",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.169",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.95",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.13",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.2",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdio: fix possible resource leaks in some error paths\n\nIf sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can\nnot release the resources, because the sdio function is not presented\nin these two cases, it won\u0027t call of_node_put() or put_device().\n\nTo fix these leaks, make sdio_func_present() only control whether\ndevice_del() needs to be called or not, then always call of_node_put()\nand put_device().\n\nIn error case in sdio_init_func(), the reference of \u0027card-\u003edev\u0027 is\nnot get, to avoid redundant put in sdio_free_func_cis(), move the\nget_device() to sdio_alloc_func() and put_device() to sdio_release_func(),\nit can keep the get/put function be balanced.\n\nWithout this patch, while doing fault inject test, it can get the\nfollowing leak reports, after this fix, the leak is gone.\n\nunreferenced object 0xffff888112514000 (size 2048):\n  comm \"kworker/3:2\", pid 65, jiffies 4294741614 (age 124.774s)\n  hex dump (first 32 bytes):\n    00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff  ..o.....`X......\n    10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff  .@Q......@Q.....\n  backtrace:\n    [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\n    [\u003c000000002f839ccb\u003e] mmc_alloc_card+0x38/0xb0 [mmc_core]\n    [\u003c0000000004adcbf6\u003e] mmc_sdio_init_card+0xde/0x170 [mmc_core]\n    [\u003c000000007538fea0\u003e] mmc_attach_sdio+0xcb/0x1b0 [mmc_core]\n    [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]\n\nunreferenced object 0xffff888112511000 (size 2048):\n  comm \"kworker/3:2\", pid 65, jiffies 4294741623 (age 124.766s)\n  hex dump (first 32 bytes):\n    00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff  .@Q......X......\n    10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff  ..Q.......Q.....\n  backtrace:\n    [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\n    [\u003c00000000fcbe706c\u003e] sdio_alloc_func+0x35/0x100 [mmc_core]\n    [\u003c00000000c68f4b50\u003e] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core]\n    [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-11T19:32:08.191Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/92ff03c2563c9b57a027c744750f3b7d2f261c58"
        },
        {
          "url": "https://git.kernel.org/stable/c/5c7858adada31dbed042448cff6997dd6efc472a"
        },
        {
          "url": "https://git.kernel.org/stable/c/761db46b29b496946046d8cb33c7ea6de6bef36e"
        },
        {
          "url": "https://git.kernel.org/stable/c/30716d9f0fa1766e522cf24c8a456244e4fc9931"
        },
        {
          "url": "https://git.kernel.org/stable/c/1e06cf04239e202248c8fa356bf11449dc73cfbd"
        },
        {
          "url": "https://git.kernel.org/stable/c/f855d31bb38d663c3ba672345d7cce9324ba3b72"
        },
        {
          "url": "https://git.kernel.org/stable/c/605d9fb9556f8f5fb4566f4df1480f280f308ded"
        }
      ],
      "title": "mmc: sdio: fix possible resource leaks in some error paths",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-52730",
    "datePublished": "2024-05-21T15:22:56.633Z",
    "dateReserved": "2024-05-21T15:19:24.232Z",
    "dateUpdated": "2026-05-11T19:32:08.191Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2023-52730",
      "date": "2026-05-19",
      "epss": "7e-05",
      "percentile": "0.00584"
    },
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmmc: sdio: fix possible resource leaks in some error paths\\n\\nIf sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can\\nnot release the resources, because the sdio function is not presented\\nin these two cases, it won\u0027t call of_node_put() or put_device().\\n\\nTo fix these leaks, make sdio_func_present() only control whether\\ndevice_del() needs to be called or not, then always call of_node_put()\\nand put_device().\\n\\nIn error case in sdio_init_func(), the reference of \u0027card-\u003edev\u0027 is\\nnot get, to avoid redundant put in sdio_free_func_cis(), move the\\nget_device() to sdio_alloc_func() and put_device() to sdio_release_func(),\\nit can keep the get/put function be balanced.\\n\\nWithout this patch, while doing fault inject test, it can get the\\nfollowing leak reports, after this fix, the leak is gone.\\n\\nunreferenced object 0xffff888112514000 (size 2048):\\n  comm \\\"kworker/3:2\\\", pid 65, jiffies 4294741614 (age 124.774s)\\n  hex dump (first 32 bytes):\\n    00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff  ..o.....`X......\\n    10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff  .@Q......@Q.....\\n  backtrace:\\n    [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\\n    [\u003c000000002f839ccb\u003e] mmc_alloc_card+0x38/0xb0 [mmc_core]\\n    [\u003c0000000004adcbf6\u003e] mmc_sdio_init_card+0xde/0x170 [mmc_core]\\n    [\u003c000000007538fea0\u003e] mmc_attach_sdio+0xcb/0x1b0 [mmc_core]\\n    [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]\\n\\nunreferenced object 0xffff888112511000 (size 2048):\\n  comm \\\"kworker/3:2\\\", pid 65, jiffies 4294741623 (age 124.766s)\\n  hex dump (first 32 bytes):\\n    00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff  .@Q......X......\\n    10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff  ..Q.......Q.....\\n  backtrace:\\n    [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\\n    [\u003c00000000fcbe706c\u003e] sdio_alloc_func+0x35/0x100 [mmc_core]\\n    [\u003c00000000c68f4b50\u003e] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core]\\n    [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mmc: sdio: soluciona posibles fugas de recursos en algunas rutas de error. Si sdio_add_func() o sdio_init_func() falla, sdio_remove_func() no puede liberar los recursos, porque no se presenta la funci\\u00f3n sdio en estos dos casos, no llamar\\u00e1 a of_node_put() o put_device(). Para solucionar estas fugas, haga que sdio_func_present() solo controle si es necesario llamar a device_del() o no, luego llame siempre a of_node_put() y put_device(). En caso de error en sdio_init_func(), la referencia de \u0027card-\u0026gt;dev\u0027 no se obtiene, para evitar la colocaci\\u00f3n redundante en sdio_free_func_cis(), mueva get_device() a sdio_alloc_func() y put_device() a sdio_release_func(), puede mantenga equilibrada la funci\\u00f3n get/put. Sin este parche, mientras realiza la prueba de inyecci\\u00f3n de fallas, puede obtener los siguientes informes de fugas; despu\\u00e9s de esta soluci\\u00f3n, la fuga desaparece. objeto sin referencia 0xffff888112514000 (tama\\u00f1o 2048): comunicaci\\u00f3n \\\"kworker/3:2\\\", pid 65, jiffies 4294741614 (edad 124,774 s) volcado hexadecimal (primeros 32 bytes): 00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 8 y siguientes ff ..o.....`X...... 10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff .@Q......@Q..... retroceso : [\u0026lt;000000009e5931da\u0026gt;] kmalloc_trace+0x21/0x110 [\u0026lt;000000002f839ccb\u0026gt;] mmc_alloc_card+0x38/0xb0 [mmc_core] [\u0026lt;0000000004adcbf6\u0026gt;] mmc_sdio_init_card+0xde/0x170 [mmc_core] [\u0026lt;000000007538fea0\u0026gt;] mmc_attach_sdio+0xcb/0x1b0 [mmc_core] [\u0026lt;00000000d4fdeba7\u0026gt;] mmc_rescan+0x54a/0x640 [mmc_core] objeto sin referencia 0xffff888112511000 (tama\\u00f1o 2048): comm \\\"kworker/3:2\\\", pid 65, santiam\\u00e9n 4294741623 (edad 124,766 s) volcado hexadecimal (primero 32 bytes): 00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff .@Q......X...... 10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff ..Q. ......P..... rastreo inverso: [\u0026lt;000000009e5931da\u0026gt;] kmalloc_trace+0x21/0x110 [\u0026lt;00000000fcbe706c\u0026gt;] sdio_alloc_func+0x35/0x100 [mmc_core] [\u0026lt;00000000c68f4b50\u0026gt;] mmc_attach_sdio.cold. 18+0xb1/ 0x395 [mmc_core] [\u0026lt;00000000d4fdeba7\u0026gt;] mmc_rescan+0x54a/0x640 [mmc_core]\"}]",
      "id": "CVE-2023-52730",
      "lastModified": "2024-11-21T08:40:27.883",
      "published": "2024-05-21T16:15:13.157",
      "references": "[{\"url\": \"https://git.kernel.org/stable/c/1e06cf04239e202248c8fa356bf11449dc73cfbd\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/30716d9f0fa1766e522cf24c8a456244e4fc9931\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/5c7858adada31dbed042448cff6997dd6efc472a\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/605d9fb9556f8f5fb4566f4df1480f280f308ded\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/761db46b29b496946046d8cb33c7ea6de6bef36e\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/92ff03c2563c9b57a027c744750f3b7d2f261c58\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/f855d31bb38d663c3ba672345d7cce9324ba3b72\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/1e06cf04239e202248c8fa356bf11449dc73cfbd\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/30716d9f0fa1766e522cf24c8a456244e4fc9931\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/5c7858adada31dbed042448cff6997dd6efc472a\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/605d9fb9556f8f5fb4566f4df1480f280f308ded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/761db46b29b496946046d8cb33c7ea6de6bef36e\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/92ff03c2563c9b57a027c744750f3b7d2f261c58\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/f855d31bb38d663c3ba672345d7cce9324ba3b72\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "vulnStatus": "Awaiting Analysis"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-52730\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-21T16:15:13.157\",\"lastModified\":\"2025-09-23T18:57:24.373\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmmc: sdio: fix possible resource leaks in some error paths\\n\\nIf sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can\\nnot release the resources, because the sdio function is not presented\\nin these two cases, it won\u0027t call of_node_put() or put_device().\\n\\nTo fix these leaks, make sdio_func_present() only control whether\\ndevice_del() needs to be called or not, then always call of_node_put()\\nand put_device().\\n\\nIn error case in sdio_init_func(), the reference of \u0027card-\u003edev\u0027 is\\nnot get, to avoid redundant put in sdio_free_func_cis(), move the\\nget_device() to sdio_alloc_func() and put_device() to sdio_release_func(),\\nit can keep the get/put function be balanced.\\n\\nWithout this patch, while doing fault inject test, it can get the\\nfollowing leak reports, after this fix, the leak is gone.\\n\\nunreferenced object 0xffff888112514000 (size 2048):\\n  comm \\\"kworker/3:2\\\", pid 65, jiffies 4294741614 (age 124.774s)\\n  hex dump (first 32 bytes):\\n    00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff  ..o.....`X......\\n    10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff  .@Q......@Q.....\\n  backtrace:\\n    [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\\n    [\u003c000000002f839ccb\u003e] mmc_alloc_card+0x38/0xb0 [mmc_core]\\n    [\u003c0000000004adcbf6\u003e] mmc_sdio_init_card+0xde/0x170 [mmc_core]\\n    [\u003c000000007538fea0\u003e] mmc_attach_sdio+0xcb/0x1b0 [mmc_core]\\n    [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]\\n\\nunreferenced object 0xffff888112511000 (size 2048):\\n  comm \\\"kworker/3:2\\\", pid 65, jiffies 4294741623 (age 124.766s)\\n  hex dump (first 32 bytes):\\n    00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff  .@Q......X......\\n    10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff  ..Q.......Q.....\\n  backtrace:\\n    [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\\n    [\u003c00000000fcbe706c\u003e] sdio_alloc_func+0x35/0x100 [mmc_core]\\n    [\u003c00000000c68f4b50\u003e] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core]\\n    [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mmc: sdio: soluciona posibles fugas de recursos en algunas rutas de error. Si sdio_add_func() o sdio_init_func() falla, sdio_remove_func() no puede liberar los recursos, porque no se presenta la funci\u00f3n sdio en estos dos casos, no llamar\u00e1 a of_node_put() o put_device(). Para solucionar estas fugas, haga que sdio_func_present() solo controle si es necesario llamar a device_del() o no, luego llame siempre a of_node_put() y put_device(). En caso de error en sdio_init_func(), la referencia de \u0027card-\u0026gt;dev\u0027 no se obtiene, para evitar la colocaci\u00f3n redundante en sdio_free_func_cis(), mueva get_device() a sdio_alloc_func() y put_device() a sdio_release_func(), puede mantenga equilibrada la funci\u00f3n get/put. Sin este parche, mientras realiza la prueba de inyecci\u00f3n de fallas, puede obtener los siguientes informes de fugas; despu\u00e9s de esta soluci\u00f3n, la fuga desaparece. objeto sin referencia 0xffff888112514000 (tama\u00f1o 2048): comunicaci\u00f3n \\\"kworker/3:2\\\", pid 65, jiffies 4294741614 (edad 124,774 s) volcado hexadecimal (primeros 32 bytes): 00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 8 y siguientes ff ..o.....`X...... 10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff .@Q......@Q..... retroceso : [\u0026lt;000000009e5931da\u0026gt;] kmalloc_trace+0x21/0x110 [\u0026lt;000000002f839ccb\u0026gt;] mmc_alloc_card+0x38/0xb0 [mmc_core] [\u0026lt;0000000004adcbf6\u0026gt;] mmc_sdio_init_card+0xde/0x170 [mmc_core] [\u0026lt;000000007538fea0\u0026gt;] mmc_attach_sdio+0xcb/0x1b0 [mmc_core] [\u0026lt;00000000d4fdeba7\u0026gt;] mmc_rescan+0x54a/0x640 [mmc_core] objeto sin referencia 0xffff888112511000 (tama\u00f1o 2048): comm \\\"kworker/3:2\\\", pid 65, santiam\u00e9n 4294741623 (edad 124,766 s) volcado hexadecimal (primero 32 bytes): 00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff .@Q......X...... 10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff ..Q. ......P..... rastreo inverso: [\u0026lt;000000009e5931da\u0026gt;] kmalloc_trace+0x21/0x110 [\u0026lt;00000000fcbe706c\u0026gt;] sdio_alloc_func+0x35/0x100 [mmc_core] [\u0026lt;00000000c68f4b50\u0026gt;] mmc_attach_sdio.cold. 18+0xb1/ 0x395 [mmc_core] [\u0026lt;00000000d4fdeba7\u0026gt;] mmc_rescan+0x54a/0x640 [mmc_core]\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.33\",\"versionEndExcluding\":\"4.14.306\",\"matchCriteriaId\":\"DB481E70-4E92-4A19-88FC-7A6923121461\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.273\",\"matchCriteriaId\":\"FC86F278-A337-4A8A-A7BB-758898345802\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.232\",\"matchCriteriaId\":\"9C6E0696-3702-4B0C-A102-2753BDC8C3D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.169\",\"matchCriteriaId\":\"D8E6784B-A00F-47F0-882B-7209E1F374B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.95\",\"matchCriteriaId\":\"8508F80E-8588-4976-A2BA-7A2D85018C4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.13\",\"matchCriteriaId\":\"CE354BE6-0C0F-47EB-AD8A-1433F041AC20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF501633-2F44-4913-A8EE-B021929F49F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BDA597B-CAC1-4DF0-86F0-42E142C654E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"725C78C9-12CE-406F-ABE8-0813A01D66E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A127C155-689C-4F67-B146-44A57F4BFD85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D34127CC-68F5-4703-A5F6-5006F803E4AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AB8D555-648E-4F2F-98BD-3E7F45BD12A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"C64BDD9D-C663-4E75-AE06-356EDC392B82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"26544390-88E4-41CA-98BF-7BB1E9D4E243\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1e06cf04239e202248c8fa356bf11449dc73cfbd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/30716d9f0fa1766e522cf24c8a456244e4fc9931\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5c7858adada31dbed042448cff6997dd6efc472a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/605d9fb9556f8f5fb4566f4df1480f280f308ded\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/761db46b29b496946046d8cb33c7ea6de6bef36e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/92ff03c2563c9b57a027c744750f3b7d2f261c58\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f855d31bb38d663c3ba672345d7cce9324ba3b72\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/1e06cf04239e202248c8fa356bf11449dc73cfbd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/30716d9f0fa1766e522cf24c8a456244e4fc9931\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5c7858adada31dbed042448cff6997dd6efc472a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/605d9fb9556f8f5fb4566f4df1480f280f308ded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/761db46b29b496946046d8cb33c7ea6de6bef36e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/92ff03c2563c9b57a027c744750f3b7d2f261c58\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f855d31bb38d663c3ba672345d7cce9324ba3b72\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/92ff03c2563c9b57a027c744750f3b7d2f261c58\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/5c7858adada31dbed042448cff6997dd6efc472a\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/761db46b29b496946046d8cb33c7ea6de6bef36e\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/30716d9f0fa1766e522cf24c8a456244e4fc9931\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/1e06cf04239e202248c8fa356bf11449dc73cfbd\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/f855d31bb38d663c3ba672345d7cce9324ba3b72\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/605d9fb9556f8f5fb4566f4df1480f280f308ded\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T23:11:35.273Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-52730\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T15:37:41.339440Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:13.664Z\"}}], \"cna\": {\"title\": \"mmc: sdio: fix possible resource leaks in some error paths\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5\", \"lessThan\": \"92ff03c2563c9b57a027c744750f3b7d2f261c58\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5\", \"lessThan\": \"5c7858adada31dbed042448cff6997dd6efc472a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5\", \"lessThan\": \"761db46b29b496946046d8cb33c7ea6de6bef36e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5\", \"lessThan\": \"30716d9f0fa1766e522cf24c8a456244e4fc9931\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5\", \"lessThan\": \"1e06cf04239e202248c8fa356bf11449dc73cfbd\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5\", \"lessThan\": \"f855d31bb38d663c3ba672345d7cce9324ba3b72\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5\", \"lessThan\": \"605d9fb9556f8f5fb4566f4df1480f280f308ded\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/mmc/core/sdio_bus.c\", \"drivers/mmc/core/sdio_cis.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.6.33\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"2.6.33\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.14.306\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.273\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.232\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.169\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.95\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.13\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.2\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/mmc/core/sdio_bus.c\", \"drivers/mmc/core/sdio_cis.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/92ff03c2563c9b57a027c744750f3b7d2f261c58\"}, {\"url\": \"https://git.kernel.org/stable/c/5c7858adada31dbed042448cff6997dd6efc472a\"}, {\"url\": \"https://git.kernel.org/stable/c/761db46b29b496946046d8cb33c7ea6de6bef36e\"}, {\"url\": \"https://git.kernel.org/stable/c/30716d9f0fa1766e522cf24c8a456244e4fc9931\"}, {\"url\": \"https://git.kernel.org/stable/c/1e06cf04239e202248c8fa356bf11449dc73cfbd\"}, {\"url\": \"https://git.kernel.org/stable/c/f855d31bb38d663c3ba672345d7cce9324ba3b72\"}, {\"url\": \"https://git.kernel.org/stable/c/605d9fb9556f8f5fb4566f4df1480f280f308ded\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmmc: sdio: fix possible resource leaks in some error paths\\n\\nIf sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can\\nnot release the resources, because the sdio function is not presented\\nin these two cases, it won\u0027t call of_node_put() or put_device().\\n\\nTo fix these leaks, make sdio_func_present() only control whether\\ndevice_del() needs to be called or not, then always call of_node_put()\\nand put_device().\\n\\nIn error case in sdio_init_func(), the reference of \u0027card-\u003edev\u0027 is\\nnot get, to avoid redundant put in sdio_free_func_cis(), move the\\nget_device() to sdio_alloc_func() and put_device() to sdio_release_func(),\\nit can keep the get/put function be balanced.\\n\\nWithout this patch, while doing fault inject test, it can get the\\nfollowing leak reports, after this fix, the leak is gone.\\n\\nunreferenced object 0xffff888112514000 (size 2048):\\n  comm \\\"kworker/3:2\\\", pid 65, jiffies 4294741614 (age 124.774s)\\n  hex dump (first 32 bytes):\\n    00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff  ..o.....`X......\\n    10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff  .@Q......@Q.....\\n  backtrace:\\n    [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\\n    [\u003c000000002f839ccb\u003e] mmc_alloc_card+0x38/0xb0 [mmc_core]\\n    [\u003c0000000004adcbf6\u003e] mmc_sdio_init_card+0xde/0x170 [mmc_core]\\n    [\u003c000000007538fea0\u003e] mmc_attach_sdio+0xcb/0x1b0 [mmc_core]\\n    [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]\\n\\nunreferenced object 0xffff888112511000 (size 2048):\\n  comm \\\"kworker/3:2\\\", pid 65, jiffies 4294741623 (age 124.766s)\\n  hex dump (first 32 bytes):\\n    00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff  .@Q......X......\\n    10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff  ..Q.......Q.....\\n  backtrace:\\n    [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\\n    [\u003c00000000fcbe706c\u003e] sdio_alloc_func+0x35/0x100 [mmc_core]\\n    [\u003c00000000c68f4b50\u003e] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core]\\n    [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T08:24:35.252Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-52730\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T08:24:35.252Z\", \"dateReserved\": \"2024-05-21T15:19:24.232Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-05-21T15:22:56.633Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…