๐Ÿ” CVE Alert

CVE-2023-54020

UNKNOWN 0.0

dmaengine: sf-pdma: pdma_desc memory leak fix

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: dmaengine: sf-pdma: pdma_desc memory leak fix Commit b2cc5c465c2c ("dmaengine: sf-pdma: Add multithread support for a DMA channel") changed sf_pdma_prep_dma_memcpy() to unconditionally allocate a new sf_pdma_desc each time it is called. The driver previously recycled descs, by checking the in_use flag, only allocating additional descs if the existing one was in use. This logic was removed in commit b2cc5c465c2c ("dmaengine: sf-pdma: Add multithread support for a DMA channel"), but sf_pdma_free_desc() was not changed to handle the new behaviour. As a result, each time sf_pdma_prep_dma_memcpy() is called, the previous descriptor is leaked, over time leading to memory starvation: unreferenced object 0xffffffe008447300 (size 192): comm "irq/39-mchp_dsc", pid 343, jiffies 4294906910 (age 981.200s) hex dump (first 32 bytes): 00 00 00 ff 00 00 00 00 b8 c1 00 00 00 00 00 00 ................ 00 00 70 08 10 00 00 00 00 00 00 c0 00 00 00 00 ..p............. backtrace: [<00000000064a04f4>] kmemleak_alloc+0x1e/0x28 [<00000000018927a7>] kmem_cache_alloc+0x11e/0x178 [<000000002aea8d16>] sf_pdma_prep_dma_memcpy+0x40/0x112 Add the missing kfree() to sf_pdma_free_desc(), and remove the redundant in_use flag.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 24, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
5ab2782c944e324008ef5d658f2494a9f0e3c5ac < ad222c9af25e3f074c180e389b3477dce42afc4f b2cc5c465c2cb8ab697c3fd6583c614e3f6cfbcc < 03fece43fa109beba7cc9948c02f5e2d1205d607 b2cc5c465c2cb8ab697c3fd6583c614e3f6cfbcc < 8bd5040bd43f2b5ba3c898b09a3197a0c7ace126 b2cc5c465c2cb8ab697c3fd6583c614e3f6cfbcc < b02e07015a5ac7bbc029da931ae17914b8ae0339 b9b4992f897be9b0b9e3a3b956cab6b75ccc3f11 4c7350b1dd8a192af844de32fc99b9e34c876fda a93b3f1e11971a91b6441b6d47488f4492cc113f
Linux / Linux
6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/ad222c9af25e3f074c180e389b3477dce42afc4f git.kernel.org: https://git.kernel.org/stable/c/03fece43fa109beba7cc9948c02f5e2d1205d607 git.kernel.org: https://git.kernel.org/stable/c/8bd5040bd43f2b5ba3c898b09a3197a0c7ace126 git.kernel.org: https://git.kernel.org/stable/c/b02e07015a5ac7bbc029da931ae17914b8ae0339