CVE-2023-52670

Source
https://cve.org/CVERecord?id=CVE-2023-52670
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52670.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52670
Downstream
Related
Published
2024-05-17T14:02:01.617Z
Modified
2026-03-20T12:32:43.305610Z
Severity
  • 6.6 (Medium) CVSS_V3 - CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
rpmsg: virtio: Free driver_override when rpmsg_remove()
Details

In the Linux kernel, the following vulnerability has been resolved:

rpmsg: virtio: Free driveroverride when rpmsgremove()

Free driveroverride when rpmsgremove(), otherwise the following memory leak will occur:

unreferenced object 0xffff0000d55d7080 (size 128): comm "kworker/u8:2", pid 56, jiffies 4294893188 (age 214.272s) hex dump (first 32 bytes): 72 70 6d 73 67 5f 6e 73 00 00 00 00 00 00 00 00 rpmsg_ns........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000009c94c9c1>] __kmemcachealloc_node+0x1f8/0x320 [<000000002300d89b>] __kmallocnodetrackcaller+0x44/0x70 [<00000000228a60c3>] kstrndup+0x4c/0x90 [<0000000077158695>] driversetoverride+0xd0/0x164 [<000000003e9c4ea5>] rpmsgregisterdeviceoverride+0x98/0x170 [<000000001c0c89a8>] rpmsgnsregisterdevice+0x24/0x30 [<000000008bbf8fa2>] rpmsgprobe+0x2e0/0x3ec [<00000000e65a68df>] virtiodevprobe+0x1c0/0x280 [<00000000443331cc>] really_probe+0xbc/0x2dc [<00000000391064b1>] __driverprobedevice+0x78/0xe0 [<00000000a41c9a5b>] driverprobedevice+0xd8/0x160 [<000000009c3bd5df>] __deviceattachdriver+0xb8/0x140 [<0000000043cd7614>] bus_foreachdrv+0x7c/0xd4 [<000000003b929a36>] _deviceattach+0x9c/0x19c [<00000000a94e0ba8>] deviceinitialprobe+0x14/0x20 [<000000003c999637>] busprobedevice+0xa0/0xac

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52670.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b0b03b8119633de0649da9bd506e4850c401ff2b
Fixed
229ce47cbfdc7d3a9415eb676abbfb77d676cb08
Fixed
dd50fe18c234bd5ff22f658f4d414e8fa8cd6a5d
Fixed
69ca89d80f2c8a1f5af429b955637beea7eead30
Fixed
2d27a7b19cb354c6d04bcdc9239e261ff29858d6
Fixed
f4bb1d5daf77b1a95a43277268adf0d1430c2346
Fixed
4e6cef3fae5c164968118a13f3fe293700adc81a
Fixed
9a416d624e5fb7246ea97c11fbfea7e0e27abf43
Fixed
d5362c37e1f8a40096452fc201c30e705750e687

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52670.json"