{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-52560","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-03-02T21:55:42.566Z","datePublished":"2024-03-02T21:59:34.084Z","dateUpdated":"2025-05-04T07:38:46.798Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T07:38:46.798Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()\n\nWhen CONFIG_DAMON_VADDR_KUNIT_TEST=y and making CONFIG_DEBUG_KMEMLEAK=y\nand CONFIG_DEBUG_KMEMLEAK_AUTO_SCAN=y, the below memory leak is detected.\n\nSince commit 9f86d624292c (\"mm/damon/vaddr-test: remove unnecessary\nvariables\"), the damon_destroy_ctx() is removed, but still call\ndamon_new_target() and damon_new_region(), the damon_region which is\nallocated by kmem_cache_alloc() in damon_new_region() and the damon_target\nwhich is allocated by kmalloc in damon_new_target() are not freed.  And\nthe damon_region which is allocated in damon_new_region() in\ndamon_set_regions() is also not freed.\n\nSo use damon_destroy_target to free all the damon_regions and damon_target.\n\n    unreferenced object 0xffff888107c9a940 (size 64):\n      comm \"kunit_try_catch\", pid 1069, jiffies 4294670592 (age 732.761s)\n      hex dump (first 32 bytes):\n        00 00 00 00 00 00 00 00 06 00 00 00 6b 6b 6b 6b  ............kkkk\n        60 c7 9c 07 81 88 ff ff f8 cb 9c 07 81 88 ff ff  `...............\n      backtrace:\n        [<ffffffff817e0167>] kmalloc_trace+0x27/0xa0\n        [<ffffffff819c11cf>] damon_new_target+0x3f/0x1b0\n        [<ffffffff819c7d55>] damon_do_test_apply_three_regions.constprop.0+0x95/0x3e0\n        [<ffffffff819c82be>] damon_test_apply_three_regions1+0x21e/0x260\n        [<ffffffff829fce6a>] kunit_generic_run_threadfn_adapter+0x4a/0x90\n        [<ffffffff81237cf6>] kthread+0x2b6/0x380\n        [<ffffffff81097add>] ret_from_fork+0x2d/0x70\n        [<ffffffff81003791>] ret_from_fork_asm+0x11/0x20\n    unreferenced object 0xffff8881079cc740 (size 56):\n      comm \"kunit_try_catch\", pid 1069, jiffies 4294670592 (age 732.761s)\n      hex dump (first 32 bytes):\n        05 00 00 00 00 00 00 00 14 00 00 00 00 00 00 00  ................\n        6b 6b 6b 6b 6b 6b 6b 6b 00 00 00 00 6b 6b 6b 6b  kkkkkkkk....kkkk\n      backtrace:\n        [<ffffffff819bc492>] damon_new_region+0x22/0x1c0\n        [<ffffffff819c7d91>] damon_do_test_apply_three_regions.constprop.0+0xd1/0x3e0\n        [<ffffffff819c82be>] damon_test_apply_three_regions1+0x21e/0x260\n        [<ffffffff829fce6a>] kunit_generic_run_threadfn_adapter+0x4a/0x90\n        [<ffffffff81237cf6>] kthread+0x2b6/0x380\n        [<ffffffff81097add>] ret_from_fork+0x2d/0x70\n        [<ffffffff81003791>] ret_from_fork_asm+0x11/0x20\n    unreferenced object 0xffff888107c9ac40 (size 64):\n      comm \"kunit_try_catch\", pid 1071, jiffies 4294670595 (age 732.843s)\n      hex dump (first 32 bytes):\n        00 00 00 00 00 00 00 00 06 00 00 00 6b 6b 6b 6b  ............kkkk\n        a0 cc 9c 07 81 88 ff ff 78 a1 76 07 81 88 ff ff  ........x.v.....\n      backtrace:\n        [<ffffffff817e0167>] kmalloc_trace+0x27/0xa0\n        [<ffffffff819c11cf>] damon_new_target+0x3f/0x1b0\n        [<ffffffff819c7d55>] damon_do_test_apply_three_regions.constprop.0+0x95/0x3e0\n        [<ffffffff819c851e>] damon_test_apply_three_regions2+0x21e/0x260\n        [<ffffffff829fce6a>] kunit_generic_run_threadfn_adapter+0x4a/0x90\n        [<ffffffff81237cf6>] kthread+0x2b6/0x380\n        [<ffffffff81097add>] ret_from_fork+0x2d/0x70\n        [<ffffffff81003791>] ret_from_fork_asm+0x11/0x20\n    unreferenced object 0xffff8881079ccc80 (size 56):\n      comm \"kunit_try_catch\", pid 1071, jiffies 4294670595 (age 732.843s)\n      hex dump (first 32 bytes):\n        05 00 00 00 00 00 00 00 14 00 00 00 00 00 00 00  ................\n        6b 6b 6b 6b 6b 6b 6b 6b 00 00 00 00 6b 6b 6b 6b  kkkkkkkk....kkkk\n      backtrace:\n        [<ffffffff819bc492>] damon_new_region+0x22/0x1c0\n        [<ffffffff819c7d91>] damon_do_test_apply_three_regions.constprop.0+0xd1/0x3e0\n        [<ffffffff819c851e>] damon_test_apply_three_regions2+0x21e/0x260\n        [<ffffffff829fce6a>] kunit_generic_run_threadfn_adapter+0x4a/0x90\n        [<ffffffff81237cf6>] kthread+0x2b6/0x380\n        [<ffffffff81097add>] ret_from_fork+0x2d/0x70\n        [<ffff\n---truncated---"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["mm/damon/vaddr-test.h"],"versions":[{"version":"9f86d624292c238203b3687cdb870a2cde1a6f9b","lessThan":"9a4fe81a8644b717d57d81ce5849e16583b13fe8","status":"affected","versionType":"git"},{"version":"9f86d624292c238203b3687cdb870a2cde1a6f9b","lessThan":"6b522001693aa113d97a985abc5f6932972e8e86","status":"affected","versionType":"git"},{"version":"9f86d624292c238203b3687cdb870a2cde1a6f9b","lessThan":"45120b15743fa7c0aa53d5db6dfb4c8f87be4abd","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["mm/damon/vaddr-test.h"],"versions":[{"version":"5.16","status":"affected"},{"version":"0","lessThan":"5.16","status":"unaffected","versionType":"semver"},{"version":"6.1.56","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.5.6","lessThanOrEqual":"6.5.*","status":"unaffected","versionType":"semver"},{"version":"6.6","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.1.56"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.5.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.6"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/9a4fe81a8644b717d57d81ce5849e16583b13fe8"},{"url":"https://git.kernel.org/stable/c/6b522001693aa113d97a985abc5f6932972e8e86"},{"url":"https://git.kernel.org/stable/c/45120b15743fa7c0aa53d5db6dfb4c8f87be4abd"}],"title":"mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-52560","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-03-04T15:35:56.845645Z"}}}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:24:06.685Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:03:20.913Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/9a4fe81a8644b717d57d81ce5849e16583b13fe8","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/6b522001693aa113d97a985abc5f6932972e8e86","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/45120b15743fa7c0aa53d5db6dfb4c8f87be4abd","tags":["x_transferred"]}]}]}}