In the Linux kernel, the following vulnerability has been resolved:
vhost-vdpa: fix use after free in vhostvdpaprobe()
The putdevice() calls vhostvdpareleasedev() which calls idasimpleremove() and frees "v". So this call to idasimpleremove() is a use after free and a double free.
[
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"183280746998194965725956741891684295759",
"249178396796530292205599454466443999918",
"335686041329846606202032456963932095998",
"28684666864985910972975544501149720259"
]
},
"target": {
"file": "drivers/vhost/vdpa.c"
},
"signature_version": "v1",
"id": "CVE-2023-52795-10184630",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e07754e0a1ea2d63fb29574253d1fd7405607343"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"183280746998194965725956741891684295759",
"249178396796530292205599454466443999918",
"335686041329846606202032456963932095998",
"28684666864985910972975544501149720259"
]
},
"target": {
"file": "drivers/vhost/vdpa.c"
},
"signature_version": "v1",
"id": "CVE-2023-52795-35c8f4ff",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ae8ea4e200675a940c365b496ef8e3fb4123601c"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"183280746998194965725956741891684295759",
"249178396796530292205599454466443999918",
"335686041329846606202032456963932095998",
"28684666864985910972975544501149720259"
]
},
"target": {
"file": "drivers/vhost/vdpa.c"
},
"signature_version": "v1",
"id": "CVE-2023-52795-42644c3b",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bf04132cd64ccde4e9e9765d489c83fe83c09b7f"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"183280746998194965725956741891684295759",
"249178396796530292205599454466443999918",
"335686041329846606202032456963932095998",
"28684666864985910972975544501149720259"
]
},
"target": {
"file": "drivers/vhost/vdpa.c"
},
"signature_version": "v1",
"id": "CVE-2023-52795-5f2a946c",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c0f8b8fb7df9d1a38652eb5aa817afccd3c56111"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "299478881082258827017464771499164094247",
"length": 1434.0
},
"target": {
"file": "drivers/vhost/vdpa.c",
"function": "vhost_vdpa_probe"
},
"signature_version": "v1",
"id": "CVE-2023-52795-61b7407b",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e07754e0a1ea2d63fb29574253d1fd7405607343"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "299478881082258827017464771499164094247",
"length": 1434.0
},
"target": {
"file": "drivers/vhost/vdpa.c",
"function": "vhost_vdpa_probe"
},
"signature_version": "v1",
"id": "CVE-2023-52795-6c62c2ff",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c0f8b8fb7df9d1a38652eb5aa817afccd3c56111"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "299478881082258827017464771499164094247",
"length": 1434.0
},
"target": {
"file": "drivers/vhost/vdpa.c",
"function": "vhost_vdpa_probe"
},
"signature_version": "v1",
"id": "CVE-2023-52795-913c864c",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ae8ea4e200675a940c365b496ef8e3fb4123601c"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "299478881082258827017464771499164094247",
"length": 1434.0
},
"target": {
"file": "drivers/vhost/vdpa.c",
"function": "vhost_vdpa_probe"
},
"signature_version": "v1",
"id": "CVE-2023-52795-ab67f606",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bf04132cd64ccde4e9e9765d489c83fe83c09b7f"
}
]