In the Linux kernel, the following vulnerability has been resolved:
soc: qcom: llcc: Handle a second device without data corruption
Usually there is only one llcc device. But if there were a second, even a failed probe call would modify the global drvdata pointer. So check if drvdata is valid before overwriting it.
{ "vanir_signatures": [ { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/soc/qcom/llcc-qcom.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "228814793524781794301913898342798587593", "221187774763053641125354590559928855422", "54207934351387065872454129457267354565" ], "threshold": 0.9 }, "id": "CVE-2023-52871-277e3535", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e5b85ea0f4bc484bfe4cc73ead51fa48d2366a0" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/soc/qcom/llcc-qcom.c", "function": "qcom_llcc_probe" }, "signature_version": "v1", "digest": { "length": 2535.0, "function_hash": "2518328245717264853130263466576717051" }, "id": "CVE-2023-52871-3736184f", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f1a1bc8775b26345aba2be278118999e7f661d3d" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/soc/qcom/llcc-qcom.c", "function": "qcom_llcc_probe" }, "signature_version": "v1", "digest": { "length": 1831.0, "function_hash": "103896724889322741549418274382622333403" }, "id": "CVE-2023-52871-473aaa24", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc1a1dcb411fe224f48553cfdcdfe6e61395b69c" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/soc/qcom/llcc-qcom.c", "function": "qcom_llcc_probe" }, "signature_version": "v1", "digest": { "length": 2344.0, "function_hash": "299834030211104372364245932397014260463" }, "id": "CVE-2023-52871-5013d5fb", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3565684309e54fa998ea27f37028d67cc3e1dff2" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/soc/qcom/llcc-qcom.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "119772979538499596343317923262000550657", "275647293872346442008558162945601593769", "16317506591612738863426319255629129523" ], "threshold": 0.9 }, "id": "CVE-2023-52871-5a56eff7", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1143bfb9b055897975aeaea254da148e19524493" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/soc/qcom/llcc-qcom.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "15359188452337844191206338136591313410", "282373246564377266380261448817420329431", "45762119277486941512477964949645663049" ], "threshold": 0.9 }, "id": "CVE-2023-52871-5cc94dde", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@995ee1e84e8db7fa5dcdde7dfe0bd7bb6f9bbb8c" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/soc/qcom/llcc-qcom.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "119067649595412227795191699802009760020", "275647293872346442008558162945601593769", "16317506591612738863426319255629129523" ], "threshold": 0.9 }, "id": "CVE-2023-52871-89d579a5", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f1a1bc8775b26345aba2be278118999e7f661d3d" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/soc/qcom/llcc-qcom.c", "function": "qcom_llcc_probe" }, "signature_version": "v1", "digest": { "length": 1917.0, "function_hash": "193701005905607897497070712013559575668" }, "id": "CVE-2023-52871-91e492a0", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e5b85ea0f4bc484bfe4cc73ead51fa48d2366a0" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/soc/qcom/llcc-qcom.c", "function": "qcom_llcc_probe" }, "signature_version": "v1", "digest": { "length": 2106.0, "function_hash": "184114521516943403952516367286876341293" }, "id": "CVE-2023-52871-9621c689", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@995ee1e84e8db7fa5dcdde7dfe0bd7bb6f9bbb8c" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/soc/qcom/llcc-qcom.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "119772979538499596343317923262000550657", "275647293872346442008558162945601593769", "16317506591612738863426319255629129523" ], "threshold": 0.9 }, "id": "CVE-2023-52871-9fe0cb8e", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3565684309e54fa998ea27f37028d67cc3e1dff2" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/soc/qcom/llcc-qcom.c", "function": "qcom_llcc_probe" }, "signature_version": "v1", "digest": { "length": 2344.0, "function_hash": "299834030211104372364245932397014260463" }, "id": "CVE-2023-52871-a0a20897", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1143bfb9b055897975aeaea254da148e19524493" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/soc/qcom/llcc-qcom.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "242302930264622441992729377949860586162", "166797247950627973320826356188478074670", "138172812917858823379176671572462761523" ], "threshold": 0.9 }, "id": "CVE-2023-52871-df7b0ddb", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc1a1dcb411fe224f48553cfdcdfe6e61395b69c" } ] }