CVE-2024-57886

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
15/01/2025
Last modified:
15/01/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mm/damon/core: fix new damon_target objects leaks on damon_commit_targets()<br /> <br /> Patch series "mm/damon/core: fix memory leaks and ignored inputs from<br /> damon_commit_ctx()".<br /> <br /> Due to two bugs in damon_commit_targets() and damon_commit_schemes(),<br /> which are called from damon_commit_ctx(), some user inputs can be ignored,<br /> and some mmeory objects can be leaked. Fix those.<br /> <br /> Note that only DAMON sysfs interface users are affected. Other DAMON core<br /> API user modules that more focused more on simple and dedicated production<br /> usages, including DAMON_RECLAIM and DAMON_LRU_SORT are not using the buggy<br /> function in the way, so not affected.<br /> <br /> <br /> This patch (of 2):<br /> <br /> When new DAMON targets are added via damon_commit_targets(), the newly<br /> created targets are not deallocated when updating the internal data<br /> (damon_commit_target()) is failed. Worse yet, even if the setup is<br /> successfully done, the new target is not linked to the context. Hence,<br /> the new targets are always leaked regardless of the internal data setup<br /> failure. Fix the leaks.

Impact