In the Linux kernel, the following vulnerability has been resolved:
rpmsg: virtio: Free driveroverride when rpmsgremove()
Free driveroverride when rpmsgremove(), otherwise the following memory leak will occur:
unreferenced object 0xffff0000d55d7080 (size 128): comm "kworker/u8:2", pid 56, jiffies 4294893188 (age 214.272s) hex dump (first 32 bytes): 72 70 6d 73 67 5f 6e 73 00 00 00 00 00 00 00 00 rpmsgns........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000009c94c9c1>] _kmemcacheallocnode+0x1f8/0x320 [<000000002300d89b>] _kmallocnodetrackcaller+0x44/0x70 [<00000000228a60c3>] kstrndup+0x4c/0x90 [<0000000077158695>] driversetoverride+0xd0/0x164 [<000000003e9c4ea5>] rpmsgregisterdeviceoverride+0x98/0x170 [<000000001c0c89a8>] rpmsgnsregisterdevice+0x24/0x30 [<000000008bbf8fa2>] rpmsgprobe+0x2e0/0x3ec [<00000000e65a68df>] virtiodevprobe+0x1c0/0x280 [<00000000443331cc>] reallyprobe+0xbc/0x2dc [<00000000391064b1>] _driverprobedevice+0x78/0xe0 [<00000000a41c9a5b>] driverprobedevice+0xd8/0x160 [<000000009c3bd5df>] _deviceattachdriver+0xb8/0x140 [<0000000043cd7614>] busforeachdrv+0x7c/0xd4 [<000000003b929a36>] _deviceattach+0x9c/0x19c [<00000000a94e0ba8>] deviceinitialprobe+0x14/0x20 [<000000003c999637>] busprobedevice+0xa0/0xac
[ { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9a416d624e5fb7246ea97c11fbfea7e0e27abf43", "target": { "file": "drivers/rpmsg/virtio_rpmsg_bus.c" }, "signature_version": "v1", "deprecated": false, "digest": { "line_hashes": [ "45583512292129068293837392588940509954", "281943270476353123211940228362764840105", "174485290451724780601833756305232570044" ], "threshold": 0.9 }, "id": "CVE-2023-52670-264ed57f", "signature_type": "Line" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4e6cef3fae5c164968118a13f3fe293700adc81a", "target": { "function": "virtio_rpmsg_release_device", "file": "drivers/rpmsg/virtio_rpmsg_bus.c" }, "signature_version": "v1", "deprecated": false, "digest": { "function_hash": "331230895571364306853144060883509151041", "length": 130.0 }, "id": "CVE-2023-52670-33af1639", "signature_type": "Function" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2d27a7b19cb354c6d04bcdc9239e261ff29858d6", "target": { "file": "drivers/rpmsg/virtio_rpmsg_bus.c" }, "signature_version": "v1", "deprecated": false, "digest": { "line_hashes": [ "45583512292129068293837392588940509954", "281943270476353123211940228362764840105", "174485290451724780601833756305232570044" ], "threshold": 0.9 }, "id": "CVE-2023-52670-39a6b190", "signature_type": "Line" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd50fe18c234bd5ff22f658f4d414e8fa8cd6a5d", "target": { "file": "drivers/rpmsg/virtio_rpmsg_bus.c" }, "signature_version": "v1", "deprecated": false, "digest": { "line_hashes": [ "45583512292129068293837392588940509954", "281943270476353123211940228362764840105", "54977324092011788775435116065993767094" ], "threshold": 0.9 }, "id": "CVE-2023-52670-3dd7b16b", "signature_type": "Line" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9a416d624e5fb7246ea97c11fbfea7e0e27abf43", "target": { "function": "virtio_rpmsg_release_device", "file": "drivers/rpmsg/virtio_rpmsg_bus.c" }, "signature_version": "v1", "deprecated": false, "digest": { "function_hash": "331230895571364306853144060883509151041", "length": 130.0 }, "id": "CVE-2023-52670-54ec674c", "signature_type": "Function" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@229ce47cbfdc7d3a9415eb676abbfb77d676cb08", "target": { "file": "drivers/rpmsg/virtio_rpmsg_bus.c" }, "signature_version": "v1", "deprecated": false, "digest": { "line_hashes": [ "45583512292129068293837392588940509954", "281943270476353123211940228362764840105", "54977324092011788775435116065993767094" ], "threshold": 0.9 }, "id": "CVE-2023-52670-551f4b99", "signature_type": "Line" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d5362c37e1f8a40096452fc201c30e705750e687", "target": { "file": "drivers/rpmsg/virtio_rpmsg_bus.c" }, "signature_version": "v1", "deprecated": false, "digest": { "line_hashes": [ "45583512292129068293837392588940509954", "281943270476353123211940228362764840105", "174485290451724780601833756305232570044" ], "threshold": 0.9 }, "id": "CVE-2023-52670-5d11b3dc", "signature_type": "Line" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d5362c37e1f8a40096452fc201c30e705750e687", "target": { "function": "virtio_rpmsg_release_device", "file": "drivers/rpmsg/virtio_rpmsg_bus.c" }, "signature_version": "v1", "deprecated": false, "digest": { "function_hash": "331230895571364306853144060883509151041", "length": 130.0 }, "id": "CVE-2023-52670-5e8e8091", "signature_type": "Function" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4e6cef3fae5c164968118a13f3fe293700adc81a", "target": { "file": "drivers/rpmsg/virtio_rpmsg_bus.c" }, "signature_version": "v1", "deprecated": false, "digest": { "line_hashes": [ "45583512292129068293837392588940509954", "281943270476353123211940228362764840105", "174485290451724780601833756305232570044" ], "threshold": 0.9 }, "id": "CVE-2023-52670-67ac2b42", "signature_type": "Line" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@229ce47cbfdc7d3a9415eb676abbfb77d676cb08", "target": { "function": "virtio_rpmsg_release_device", "file": "drivers/rpmsg/virtio_rpmsg_bus.c" }, "signature_version": "v1", "deprecated": false, "digest": { "function_hash": "331230895571364306853144060883509151041", "length": 130.0 }, "id": "CVE-2023-52670-8a3ccaa3", "signature_type": "Function" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@69ca89d80f2c8a1f5af429b955637beea7eead30", "target": { "file": "drivers/rpmsg/virtio_rpmsg_bus.c" }, "signature_version": "v1", "deprecated": false, "digest": { "line_hashes": [ "45583512292129068293837392588940509954", "281943270476353123211940228362764840105", "54977324092011788775435116065993767094" ], "threshold": 0.9 }, "id": "CVE-2023-52670-8c2a2ed3", "signature_type": "Line" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd50fe18c234bd5ff22f658f4d414e8fa8cd6a5d", "target": { "function": "virtio_rpmsg_release_device", "file": "drivers/rpmsg/virtio_rpmsg_bus.c" }, "signature_version": "v1", "deprecated": false, "digest": { "function_hash": "331230895571364306853144060883509151041", "length": 130.0 }, "id": "CVE-2023-52670-8d4f0224", "signature_type": "Function" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@69ca89d80f2c8a1f5af429b955637beea7eead30", "target": { "function": "virtio_rpmsg_release_device", "file": "drivers/rpmsg/virtio_rpmsg_bus.c" }, "signature_version": "v1", "deprecated": false, "digest": { "function_hash": "331230895571364306853144060883509151041", "length": 130.0 }, "id": "CVE-2023-52670-aac3e689", "signature_type": "Function" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2d27a7b19cb354c6d04bcdc9239e261ff29858d6", "target": { "function": "virtio_rpmsg_release_device", "file": "drivers/rpmsg/virtio_rpmsg_bus.c" }, "signature_version": "v1", "deprecated": false, "digest": { "function_hash": "331230895571364306853144060883509151041", "length": 130.0 }, "id": "CVE-2023-52670-c4d21932", "signature_type": "Function" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f4bb1d5daf77b1a95a43277268adf0d1430c2346", "target": { "function": "virtio_rpmsg_release_device", "file": "drivers/rpmsg/virtio_rpmsg_bus.c" }, "signature_version": "v1", "deprecated": false, "digest": { "function_hash": "331230895571364306853144060883509151041", "length": 130.0 }, "id": "CVE-2023-52670-db639f07", "signature_type": "Function" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f4bb1d5daf77b1a95a43277268adf0d1430c2346", "target": { "file": "drivers/rpmsg/virtio_rpmsg_bus.c" }, "signature_version": "v1", "deprecated": false, "digest": { "line_hashes": [ "45583512292129068293837392588940509954", "281943270476353123211940228362764840105", "174485290451724780601833756305232570044" ], "threshold": 0.9 }, "id": "CVE-2023-52670-ef33e54c", "signature_type": "Line" } ]