CVE-2024-57886
Vulnerability from cvelistv5
Published
2025-01-15 13:05
Modified
2025-01-20 06:28
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: mm/damon/core: fix new damon_target objects leaks on damon_commit_targets() Patch series "mm/damon/core: fix memory leaks and ignored inputs from damon_commit_ctx()". Due to two bugs in damon_commit_targets() and damon_commit_schemes(), which are called from damon_commit_ctx(), some user inputs can be ignored, and some mmeory objects can be leaked. Fix those. Note that only DAMON sysfs interface users are affected. Other DAMON core API user modules that more focused more on simple and dedicated production usages, including DAMON_RECLAIM and DAMON_LRU_SORT are not using the buggy function in the way, so not affected. This patch (of 2): When new DAMON targets are added via damon_commit_targets(), the newly created targets are not deallocated when updating the internal data (damon_commit_target()) is failed. Worse yet, even if the setup is successfully done, the new target is not linked to the context. Hence, the new targets are always leaked regardless of the internal data setup failure. Fix the leaks.
Impacted products
Vendor Product Version
Linux Linux Version: 9cb3d0b9dfce6a3258d91e6d69e418d0b4cce46a
Version: 9cb3d0b9dfce6a3258d91e6d69e418d0b4cce46a
Create a notification for this product.
   Linux Linux Version: 6.11
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "mm/damon/core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "3647932d0b3e609c762c55e8f9fe10a09776e0a7",
              "status": "affected",
              "version": "9cb3d0b9dfce6a3258d91e6d69e418d0b4cce46a",
              "versionType": "git"
            },
            {
              "lessThan": "8debfc5b1aa569d3d2ac836af2553da037611c61",
              "status": "affected",
              "version": "9cb3d0b9dfce6a3258d91e6d69e418d0b4cce46a",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "mm/damon/core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.11"
            },
            {
              "lessThan": "6.11",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.13",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/damon/core: fix new damon_target objects leaks on damon_commit_targets()\n\nPatch series \"mm/damon/core: fix memory leaks and ignored inputs from\ndamon_commit_ctx()\".\n\nDue to two bugs in damon_commit_targets() and damon_commit_schemes(),\nwhich are called from damon_commit_ctx(), some user inputs can be ignored,\nand some mmeory objects can be leaked.  Fix those.\n\nNote that only DAMON sysfs interface users are affected.  Other DAMON core\nAPI user modules that more focused more on simple and dedicated production\nusages, including DAMON_RECLAIM and DAMON_LRU_SORT are not using the buggy\nfunction in the way, so not affected.\n\n\nThis patch (of 2):\n\nWhen new DAMON targets are added via damon_commit_targets(), the newly\ncreated targets are not deallocated when updating the internal data\n(damon_commit_target()) is failed.  Worse yet, even if the setup is\nsuccessfully done, the new target is not linked to the context.  Hence,\nthe new targets are always leaked regardless of the internal data setup\nfailure.  Fix the leaks."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-20T06:28:53.774Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/3647932d0b3e609c762c55e8f9fe10a09776e0a7"
        },
        {
          "url": "https://git.kernel.org/stable/c/8debfc5b1aa569d3d2ac836af2553da037611c61"
        }
      ],
      "title": "mm/damon/core: fix new damon_target objects leaks on damon_commit_targets()",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-57886",
    "datePublished": "2025-01-15T13:05:39.110Z",
    "dateReserved": "2025-01-11T14:45:42.026Z",
    "dateUpdated": "2025-01-20T06:28:53.774Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-57886\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-01-15T13:15:13.010\",\"lastModified\":\"2025-01-15T13:15:13.010\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmm/damon/core: fix new damon_target objects leaks on damon_commit_targets()\\n\\nPatch series \\\"mm/damon/core: fix memory leaks and ignored inputs from\\ndamon_commit_ctx()\\\".\\n\\nDue to two bugs in damon_commit_targets() and damon_commit_schemes(),\\nwhich are called from damon_commit_ctx(), some user inputs can be ignored,\\nand some mmeory objects can be leaked.  Fix those.\\n\\nNote that only DAMON sysfs interface users are affected.  Other DAMON core\\nAPI user modules that more focused more on simple and dedicated production\\nusages, including DAMON_RECLAIM and DAMON_LRU_SORT are not using the buggy\\nfunction in the way, so not affected.\\n\\n\\nThis patch (of 2):\\n\\nWhen new DAMON targets are added via damon_commit_targets(), the newly\\ncreated targets are not deallocated when updating the internal data\\n(damon_commit_target()) is failed.  Worse yet, even if the setup is\\nsuccessfully done, the new target is not linked to the context.  Hence,\\nthe new targets are always leaked regardless of the internal data setup\\nfailure.  Fix the leaks.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/damon/core: corrige nuevas fugas de objetos damon_target en damon_commit_targets() Serie de parches \\\"mm/damon/core: corrige fugas de memoria y entradas ignoradas de damon_commit_ctx()\\\". Debido a dos errores en damon_commit_targets() y damon_commit_schemes(), que se llaman desde damon_commit_ctx(), algunas entradas de usuario pueden ignorarse y algunos objetos de memoria pueden filtrarse. Arr\u00e9glelos. Tenga en cuenta que solo los usuarios de la interfaz sysfs de DAMON se ven afectados. Otros m\u00f3dulos de usuario de la API del n\u00facleo de DAMON que se centran m\u00e1s en usos de producci\u00f3n simples y dedicados, incluidos DAMON_RECLAIM y DAMON_LRU_SORT, no utilizan la funci\u00f3n con errores de la misma manera, por lo que no se ven afectados. Este parche (de 2): Cuando se agregan nuevos objetivos DAMON a trav\u00e9s de damon_commit_targets(), los objetivos reci\u00e9n creados no se desasignan cuando falla la actualizaci\u00f3n de los datos internos (damon_commit_target()). Peor a\u00fan, incluso si la configuraci\u00f3n se realiza correctamente, el nuevo objetivo no est\u00e1 vinculado al contexto. Por lo tanto, los nuevos objetivos siempre se filtran independientemente de la falla de configuraci\u00f3n de los datos internos. Corrija las filtraciones.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/3647932d0b3e609c762c55e8f9fe10a09776e0a7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8debfc5b1aa569d3d2ac836af2553da037611c61\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.