In the Linux kernel, the following vulnerability has been resolved:
IORINGOPREAD did not correctly consume the provided buffer list when read i/o returned < 0 (except for -EAGAIN and -EIOCBQUEUED return). This can lead to a potential use-after-free when the completion via iorwdone runs at separate context.
{ "vanir_signatures": [ { "digest": { "line_hashes": [ "296288643414777042902554369633842415059", "289316311329748740999915528172535817899", "224416554777523822664339610295683496890", "122305348483479343492674872088218961783", "336432205935158884966996174602650507994", "122434915887066665369905563028849018030", "59418600845746743711271727868677383055", "140729669429704889997883998382787464489" ], "threshold": 0.9 }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6c27fc6a783c8a77c756dd5461b15e465020d075", "signature_type": "Line", "target": { "file": "io_uring/rw.c" }, "deprecated": false, "signature_version": "v1", "id": "CVE-2023-52926-1fe141f9" }, { "digest": { "length": 2579.0, "function_hash": "8516173120988179081065418273637252013" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a08d195b586a217d76b42062f88f375a3eedda4d", "signature_type": "Function", "target": { "function": "io_read", "file": "io_uring/rw.c" }, "deprecated": false, "signature_version": "v1", "id": "CVE-2023-52926-2a9f7179" }, { "digest": { "length": 2579.0, "function_hash": "8516173120988179081065418273637252013" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6c27fc6a783c8a77c756dd5461b15e465020d075", "signature_type": "Function", "target": { "function": "io_read", "file": "io_uring/rw.c" }, "deprecated": false, "signature_version": "v1", "id": "CVE-2023-52926-47e21490" }, { "digest": { "length": 2579.0, "function_hash": "8516173120988179081065418273637252013" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@72060434a14caea20925e492310d6e680e3f9007", "signature_type": "Function", "target": { "function": "io_read", "file": "io_uring/rw.c" }, "deprecated": false, "signature_version": "v1", "id": "CVE-2023-52926-66da80ad" }, { "digest": { "line_hashes": [ "296288643414777042902554369633842415059", "289316311329748740999915528172535817899", "224416554777523822664339610295683496890", "122305348483479343492674872088218961783", "336432205935158884966996174602650507994", "122434915887066665369905563028849018030", "59418600845746743711271727868677383055", "140729669429704889997883998382787464489" ], "threshold": 0.9 }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@72060434a14caea20925e492310d6e680e3f9007", "signature_type": "Line", "target": { "file": "io_uring/rw.c" }, "deprecated": false, "signature_version": "v1", "id": "CVE-2023-52926-b90de7e8" }, { "digest": { "line_hashes": [ "296288643414777042902554369633842415059", "289316311329748740999915528172535817899", "224416554777523822664339610295683496890", "122305348483479343492674872088218961783", "336432205935158884966996174602650507994", "122434915887066665369905563028849018030", "318598445607591102677796671176525494636", "126597834732414857825524133569846608612" ], "threshold": 0.9 }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a08d195b586a217d76b42062f88f375a3eedda4d", "signature_type": "Line", "target": { "file": "io_uring/rw.c" }, "deprecated": false, "signature_version": "v1", "id": "CVE-2023-52926-e9244851" } ] }