Release Date: | 2024-03-02 | |
Impact: | Low | What is this? |
In the Linux kernel, the following vulnerability has been resolved:\nmm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()\nWhen CONFIG_DAMON_VADDR_KUNIT_TEST=y and making CONFIG_DEBUG_KMEMLEAK=y\nand CONFIG_DEBUG_KMEMLEAK_AUTO_SCAN=y, the below memory leak is detected.\nSince commit 9f86d624292c ('mm/damon/vaddr-test: remove unnecessary\nvariables'), the damon_destroy_ctx() is removed, but still call\ndamon_new_target() and damon_new_region(), the damon_region which is\nallocated by kmem_cache_alloc() in damon_new_region() and the damon_target\nwhich is allocated by kmalloc in damon_new_target() are not freed. And\nthe damon_region which is allocated in damon_new_region() in\ndamon_set_regions() is also not freed.\nSo use damon_destroy_target to free all the damon_regions and damon_target.\nunreferenced object 0xffff888107c9a940 (size 64):\ncomm 'kunit_try_catch', pid 1069, jiffies 4294670592 (age 732.761s)\nhex dump (first 32 bytes):\n00 00 00 00 00 00 00 00 06 00 00 00 6b 6b 6b 6b ............kkkk\n60 c7 9c 07 81 88 ff ff f8 cb 9c 07 81 88 ff ff `...............\nbacktrace:\n[ See more information about CVE-2023-52560 from MITRE CVE dictionary and NIST NVD NOTE: The following CVSS metrics and score provided are preliminary and subject to review.CVSS v3 metrics
Base Score: 3.3
Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Version: 3.1
Attack Vector: Local
Attack Complexity: Low
Privileges Required: Low
User Interaction: None
Scope: Unchanged
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Low
Errata information
Platform Errata Release Date Oracle Linux version 8 (kernel) ELSA-2024-4211 2024-07-02 Oracle Linux version 9 (kernel) ELSA-2024-9315 2024-11-14
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: