CVE-2023-52730: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: mmc: sdio: fix possible resource leaks in some error paths If sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can not release the resources, because the sdio function is not presented in these two cases, it won't call of_node_put() or put_device(). To fix these leaks, make sdio_func_present() only control whether device_del() needs to be called or not, then always call of_node_put() and put_device(). In error case in sdio_init_func(), the reference of 'card->dev' is not get, to avoid redundant put in sdio_free_func_cis(), move the get_device() to sdio_alloc_func() and put_device() to sdio_release_func(), it can keep the get/put function be balanced. Without this patch, while doing fault inject test, it can get the following leak reports, after this fix, the leak is gone. unreferenced object 0xffff888112514000 (size 2048): comm "kworker/3:2", pid 65, jiffies 4294741614 (age 124.774s) hex dump (first 32 bytes): 00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff ..o.....`X...... 10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff .@Q......@Q..... backtrace: [<000000009e5931da>] kmalloc_trace+0x21/0x110 [<000000002f839ccb>] mmc_alloc_card+0x38/0xb0 [mmc_core] [<0000000004adcbf6>] mmc_sdio_init_card+0xde/0x170 [mmc_core] [<000000007538fea0>] mmc_attach_sdio+0xcb/0x1b0 [mmc_core] [<00000000d4fdeba7>] mmc_rescan+0x54a/0x640 [mmc_core] unreferenced object 0xffff888112511000 (size 2048): comm "kworker/3:2", pid 65, jiffies 4294741623 (age 124.766s) hex dump (first 32 bytes): 00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff .@Q......X...... 10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff ..Q.......Q..... backtrace: [<000000009e5931da>] kmalloc_trace+0x21/0x110 [<00000000fcbe706c>] sdio_alloc_func+0x35/0x100 [mmc_core] [<00000000c68f4b50>] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core] [<00000000d4fdeba7>] mmc_rescan+0x54a/0x640 [mmc_core]
AI Analysis
Technical Summary
CVE-2023-52730 addresses a resource leak vulnerability in the Linux kernel's MMC (MultiMediaCard) subsystem, specifically within the SDIO (Secure Digital Input Output) function handling code. The vulnerability arises from improper resource management in error paths during the initialization and addition of SDIO functions. When either sdio_add_func() or sdio_init_func() fails, the corresponding cleanup function sdio_remove_func() does not release allocated resources properly because the SDIO function is not fully registered or presented. Consequently, critical reference counts for device nodes and device objects (tracked via of_node_put() and put_device()) are not decremented, leading to resource leaks. The patch modifies the logic so that sdio_func_present() only controls whether device_del() is called, but ensures that of_node_put() and put_device() are always invoked to balance reference counts. Additionally, the patch moves get_device() calls to sdio_alloc_func() and put_device() calls to sdio_release_func() to maintain balanced get/put device references, preventing redundant decrements and ensuring proper cleanup. This fix eliminates unreferenced object leaks detected during fault injection testing, which previously manifested as unreleased kernel memory objects associated with SDIO card devices. The vulnerability does not appear to allow direct code execution or privilege escalation but can cause kernel memory leaks that degrade system stability and reliability over time, especially on systems heavily utilizing SDIO devices. The issue affects Linux kernel versions identified by the commit hash 3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5 and potentially other versions incorporating the vulnerable code. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability is primarily a resource management flaw rather than a direct security bypass or escalation vector.
Potential Impact
For European organizations, the primary impact of CVE-2023-52730 lies in potential system stability and reliability degradation on Linux systems that utilize SDIO devices, such as embedded systems, industrial controllers, IoT devices, or laptops with SDIO-based peripherals. Resource leaks in kernel memory can accumulate over time, leading to increased memory consumption, potential kernel panics, or system crashes, which could disrupt critical business operations or industrial processes. While this vulnerability does not directly compromise confidentiality or integrity, availability could be affected due to system instability. Organizations relying on Linux-based infrastructure with SDIO hardware components may experience degraded performance or unexpected downtime if the vulnerability is exploited or triggered by faulty device interactions. This is particularly relevant for sectors with embedded Linux deployments, such as manufacturing, telecommunications, transportation, and critical infrastructure in Europe. Given the lack of known exploits, the immediate risk is moderate, but unpatched systems remain vulnerable to stability issues. The vulnerability also highlights the importance of rigorous kernel maintenance and patching practices to prevent latent bugs from impacting operational continuity.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1. Patch Management: Promptly apply the official Linux kernel patches that address CVE-2023-52730 once available from trusted Linux distributions or kernel maintainers. Monitor vendor advisories for updated kernel packages. 2. Kernel Version Control: Avoid running unpatched or custom kernel builds that include the vulnerable SDIO code paths. Validate kernel versions against known fixed commits. 3. SDIO Device Inventory: Identify and document all systems using SDIO devices, including embedded and IoT devices, to prioritize patch deployment. 4. Monitoring and Diagnostics: Implement kernel memory usage monitoring and logging to detect abnormal memory growth or leaks that could indicate exploitation or triggering of the vulnerability. 5. Fault Injection Testing: For organizations with in-house kernel development or customization, conduct fault injection testing similar to the one described to verify the absence of resource leaks. 6. Controlled Device Usage: Limit or control the use of SDIO devices on critical systems until patches are applied, especially in environments where system availability is paramount. 7. Vendor Coordination: Engage with hardware and Linux distribution vendors to ensure timely updates and support for affected devices and kernels. These measures go beyond generic advice by emphasizing targeted inventory, monitoring, and testing specific to the SDIO subsystem and kernel resource management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2023-52730: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: mmc: sdio: fix possible resource leaks in some error paths If sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can not release the resources, because the sdio function is not presented in these two cases, it won't call of_node_put() or put_device(). To fix these leaks, make sdio_func_present() only control whether device_del() needs to be called or not, then always call of_node_put() and put_device(). In error case in sdio_init_func(), the reference of 'card->dev' is not get, to avoid redundant put in sdio_free_func_cis(), move the get_device() to sdio_alloc_func() and put_device() to sdio_release_func(), it can keep the get/put function be balanced. Without this patch, while doing fault inject test, it can get the following leak reports, after this fix, the leak is gone. unreferenced object 0xffff888112514000 (size 2048): comm "kworker/3:2", pid 65, jiffies 4294741614 (age 124.774s) hex dump (first 32 bytes): 00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff ..o.....`X...... 10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff .@Q......@Q..... backtrace: [<000000009e5931da>] kmalloc_trace+0x21/0x110 [<000000002f839ccb>] mmc_alloc_card+0x38/0xb0 [mmc_core] [<0000000004adcbf6>] mmc_sdio_init_card+0xde/0x170 [mmc_core] [<000000007538fea0>] mmc_attach_sdio+0xcb/0x1b0 [mmc_core] [<00000000d4fdeba7>] mmc_rescan+0x54a/0x640 [mmc_core] unreferenced object 0xffff888112511000 (size 2048): comm "kworker/3:2", pid 65, jiffies 4294741623 (age 124.766s) hex dump (first 32 bytes): 00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff .@Q......X...... 10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff ..Q.......Q..... backtrace: [<000000009e5931da>] kmalloc_trace+0x21/0x110 [<00000000fcbe706c>] sdio_alloc_func+0x35/0x100 [mmc_core] [<00000000c68f4b50>] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core] [<00000000d4fdeba7>] mmc_rescan+0x54a/0x640 [mmc_core]
AI-Powered Analysis
Technical Analysis
CVE-2023-52730 addresses a resource leak vulnerability in the Linux kernel's MMC (MultiMediaCard) subsystem, specifically within the SDIO (Secure Digital Input Output) function handling code. The vulnerability arises from improper resource management in error paths during the initialization and addition of SDIO functions. When either sdio_add_func() or sdio_init_func() fails, the corresponding cleanup function sdio_remove_func() does not release allocated resources properly because the SDIO function is not fully registered or presented. Consequently, critical reference counts for device nodes and device objects (tracked via of_node_put() and put_device()) are not decremented, leading to resource leaks. The patch modifies the logic so that sdio_func_present() only controls whether device_del() is called, but ensures that of_node_put() and put_device() are always invoked to balance reference counts. Additionally, the patch moves get_device() calls to sdio_alloc_func() and put_device() calls to sdio_release_func() to maintain balanced get/put device references, preventing redundant decrements and ensuring proper cleanup. This fix eliminates unreferenced object leaks detected during fault injection testing, which previously manifested as unreleased kernel memory objects associated with SDIO card devices. The vulnerability does not appear to allow direct code execution or privilege escalation but can cause kernel memory leaks that degrade system stability and reliability over time, especially on systems heavily utilizing SDIO devices. The issue affects Linux kernel versions identified by the commit hash 3d10a1ba0d37c8f5fd5afcdda00613fbb8a90bf5 and potentially other versions incorporating the vulnerable code. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability is primarily a resource management flaw rather than a direct security bypass or escalation vector.
Potential Impact
For European organizations, the primary impact of CVE-2023-52730 lies in potential system stability and reliability degradation on Linux systems that utilize SDIO devices, such as embedded systems, industrial controllers, IoT devices, or laptops with SDIO-based peripherals. Resource leaks in kernel memory can accumulate over time, leading to increased memory consumption, potential kernel panics, or system crashes, which could disrupt critical business operations or industrial processes. While this vulnerability does not directly compromise confidentiality or integrity, availability could be affected due to system instability. Organizations relying on Linux-based infrastructure with SDIO hardware components may experience degraded performance or unexpected downtime if the vulnerability is exploited or triggered by faulty device interactions. This is particularly relevant for sectors with embedded Linux deployments, such as manufacturing, telecommunications, transportation, and critical infrastructure in Europe. Given the lack of known exploits, the immediate risk is moderate, but unpatched systems remain vulnerable to stability issues. The vulnerability also highlights the importance of rigorous kernel maintenance and patching practices to prevent latent bugs from impacting operational continuity.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1. Patch Management: Promptly apply the official Linux kernel patches that address CVE-2023-52730 once available from trusted Linux distributions or kernel maintainers. Monitor vendor advisories for updated kernel packages. 2. Kernel Version Control: Avoid running unpatched or custom kernel builds that include the vulnerable SDIO code paths. Validate kernel versions against known fixed commits. 3. SDIO Device Inventory: Identify and document all systems using SDIO devices, including embedded and IoT devices, to prioritize patch deployment. 4. Monitoring and Diagnostics: Implement kernel memory usage monitoring and logging to detect abnormal memory growth or leaks that could indicate exploitation or triggering of the vulnerability. 5. Fault Injection Testing: For organizations with in-house kernel development or customization, conduct fault injection testing similar to the one described to verify the absence of resource leaks. 6. Controlled Device Usage: Limit or control the use of SDIO devices on critical systems until patches are applied, especially in environments where system availability is paramount. 7. Vendor Coordination: Engage with hardware and Linux distribution vendors to ensure timely updates and support for affected devices and kernels. These measures go beyond generic advice by emphasizing targeted inventory, monitoring, and testing specific to the SDIO subsystem and kernel resource management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T15:19:24.232Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9830c4522896dcbe73e0
Added to database: 5/21/2025, 9:09:04 AM
Last enriched: 7/1/2025, 6:11:28 AM
Last updated: 7/29/2025, 5:31:55 PM
Views: 15
Related Threats
CVE-2025-8983: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50862: n/a
MediumCVE-2025-50861: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.