In the Linux kernel, the following vulnerability has been resolved:
IORINGOPREAD did not correctly consume the provided buffer list when read i/o returned < 0 (except for -EAGAIN and -EIOCBQUEUED return). This can lead to a potential use-after-free when the completion via iorwdone runs at separate context.
[
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"296288643414777042902554369633842415059",
"289316311329748740999915528172535817899",
"224416554777523822664339610295683496890",
"122305348483479343492674872088218961783",
"336432205935158884966996174602650507994",
"122434915887066665369905563028849018030",
"59418600845746743711271727868677383055",
"140729669429704889997883998382787464489"
]
},
"target": {
"file": "io_uring/rw.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6c27fc6a783c8a77c756dd5461b15e465020d075",
"id": "CVE-2023-52926-1fe141f9",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "8516173120988179081065418273637252013",
"length": 2579.0
},
"target": {
"file": "io_uring/rw.c",
"function": "io_read"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a08d195b586a217d76b42062f88f375a3eedda4d",
"id": "CVE-2023-52926-2a9f7179",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "8516173120988179081065418273637252013",
"length": 2579.0
},
"target": {
"file": "io_uring/rw.c",
"function": "io_read"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6c27fc6a783c8a77c756dd5461b15e465020d075",
"id": "CVE-2023-52926-47e21490",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "8516173120988179081065418273637252013",
"length": 2579.0
},
"target": {
"file": "io_uring/rw.c",
"function": "io_read"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@72060434a14caea20925e492310d6e680e3f9007",
"id": "CVE-2023-52926-66da80ad",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"296288643414777042902554369633842415059",
"289316311329748740999915528172535817899",
"224416554777523822664339610295683496890",
"122305348483479343492674872088218961783",
"336432205935158884966996174602650507994",
"122434915887066665369905563028849018030",
"59418600845746743711271727868677383055",
"140729669429704889997883998382787464489"
]
},
"target": {
"file": "io_uring/rw.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@72060434a14caea20925e492310d6e680e3f9007",
"id": "CVE-2023-52926-b90de7e8",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"296288643414777042902554369633842415059",
"289316311329748740999915528172535817899",
"224416554777523822664339610295683496890",
"122305348483479343492674872088218961783",
"336432205935158884966996174602650507994",
"122434915887066665369905563028849018030",
"318598445607591102677796671176525494636",
"126597834732414857825524133569846608612"
]
},
"target": {
"file": "io_uring/rw.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a08d195b586a217d76b42062f88f375a3eedda4d",
"id": "CVE-2023-52926-e9244851",
"deprecated": false,
"signature_version": "v1"
}
]