In the Linux kernel, the following vulnerability has been resolved:
soc: qcom: llcc: Handle a second device without data corruption
Usually there is only one llcc device. But if there were a second, even a failed probe call would modify the global drvdata pointer. So check if drvdata is valid before overwriting it.
[
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"228814793524781794301913898342798587593",
"221187774763053641125354590559928855422",
"54207934351387065872454129457267354565"
]
},
"target": {
"file": "drivers/soc/qcom/llcc-qcom.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e5b85ea0f4bc484bfe4cc73ead51fa48d2366a0",
"id": "CVE-2023-52871-277e3535",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "2518328245717264853130263466576717051",
"length": 2535.0
},
"target": {
"file": "drivers/soc/qcom/llcc-qcom.c",
"function": "qcom_llcc_probe"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f1a1bc8775b26345aba2be278118999e7f661d3d",
"id": "CVE-2023-52871-3736184f",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "103896724889322741549418274382622333403",
"length": 1831.0
},
"target": {
"file": "drivers/soc/qcom/llcc-qcom.c",
"function": "qcom_llcc_probe"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc1a1dcb411fe224f48553cfdcdfe6e61395b69c",
"id": "CVE-2023-52871-473aaa24",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "299834030211104372364245932397014260463",
"length": 2344.0
},
"target": {
"file": "drivers/soc/qcom/llcc-qcom.c",
"function": "qcom_llcc_probe"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3565684309e54fa998ea27f37028d67cc3e1dff2",
"id": "CVE-2023-52871-5013d5fb",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"119772979538499596343317923262000550657",
"275647293872346442008558162945601593769",
"16317506591612738863426319255629129523"
]
},
"target": {
"file": "drivers/soc/qcom/llcc-qcom.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1143bfb9b055897975aeaea254da148e19524493",
"id": "CVE-2023-52871-5a56eff7",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"15359188452337844191206338136591313410",
"282373246564377266380261448817420329431",
"45762119277486941512477964949645663049"
]
},
"target": {
"file": "drivers/soc/qcom/llcc-qcom.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@995ee1e84e8db7fa5dcdde7dfe0bd7bb6f9bbb8c",
"id": "CVE-2023-52871-5cc94dde",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"119067649595412227795191699802009760020",
"275647293872346442008558162945601593769",
"16317506591612738863426319255629129523"
]
},
"target": {
"file": "drivers/soc/qcom/llcc-qcom.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f1a1bc8775b26345aba2be278118999e7f661d3d",
"id": "CVE-2023-52871-89d579a5",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "193701005905607897497070712013559575668",
"length": 1917.0
},
"target": {
"file": "drivers/soc/qcom/llcc-qcom.c",
"function": "qcom_llcc_probe"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e5b85ea0f4bc484bfe4cc73ead51fa48d2366a0",
"id": "CVE-2023-52871-91e492a0",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "184114521516943403952516367286876341293",
"length": 2106.0
},
"target": {
"file": "drivers/soc/qcom/llcc-qcom.c",
"function": "qcom_llcc_probe"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@995ee1e84e8db7fa5dcdde7dfe0bd7bb6f9bbb8c",
"id": "CVE-2023-52871-9621c689",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"119772979538499596343317923262000550657",
"275647293872346442008558162945601593769",
"16317506591612738863426319255629129523"
]
},
"target": {
"file": "drivers/soc/qcom/llcc-qcom.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3565684309e54fa998ea27f37028d67cc3e1dff2",
"id": "CVE-2023-52871-9fe0cb8e",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "299834030211104372364245932397014260463",
"length": 2344.0
},
"target": {
"file": "drivers/soc/qcom/llcc-qcom.c",
"function": "qcom_llcc_probe"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1143bfb9b055897975aeaea254da148e19524493",
"id": "CVE-2023-52871-a0a20897",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "299834030211104372364245932397014260463",
"length": 2344.0
},
"target": {
"file": "drivers/soc/qcom/llcc-qcom.c",
"function": "qcom_llcc_probe"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f0ef883cae309bc5e8cdfcdbc1b4822732ce20a8",
"id": "CVE-2023-52871-c9947f2f",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"119772979538499596343317923262000550657",
"275647293872346442008558162945601593769",
"16317506591612738863426319255629129523"
]
},
"target": {
"file": "drivers/soc/qcom/llcc-qcom.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f0ef883cae309bc5e8cdfcdbc1b4822732ce20a8",
"id": "CVE-2023-52871-d04a8153",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"242302930264622441992729377949860586162",
"166797247950627973320826356188478074670",
"138172812917858823379176671572462761523"
]
},
"target": {
"file": "drivers/soc/qcom/llcc-qcom.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc1a1dcb411fe224f48553cfdcdfe6e61395b69c",
"id": "CVE-2023-52871-df7b0ddb",
"deprecated": false,
"signature_version": "v1"
}
]