In the Linux kernel, the following vulnerability has been resolved:
remoteproc: imx_rproc: Skip over memory region when node value is NULL
In imxrprocaddrinit() "nph = ofcountphandlewithargs()" just counts number of phandles. But phandles may be empty. So ofparse_phandle() in the parsing loop (0 < a < nph) may return NULL which is later dereferenced. Adjust this issue by adding NULL-return check.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
[Fixed title to fit within the prescribed 70-75 charcters]
[
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/remoteproc/imx_rproc.c"
},
"digest": {
"line_hashes": [
"44624784301929218347937977959696355982",
"296909900779541927240026803507580830285",
"259433784848351103110805065425647369065",
"157573331491911590791793137253073301080"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2fa26ca8b786888673689ccc9da6094150939982",
"signature_version": "v1",
"id": "CVE-2024-43860-0432336b"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/remoteproc/imx_rproc.c"
},
"digest": {
"line_hashes": [
"44624784301929218347937977959696355982",
"132310309837672687339400081629636927561",
"16896071916531439549892705522452404237",
"168678646332369608736037599732731916888"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6b50462b473fdccdc0dfad73001147e40ff19a66",
"signature_version": "v1",
"id": "CVE-2024-43860-44b5fbeb"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/remoteproc/imx_rproc.c",
"function": "imx_rproc_addr_init"
},
"digest": {
"length": 1748.0,
"function_hash": "161961382897050781770296727888778932389"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2fa26ca8b786888673689ccc9da6094150939982",
"signature_version": "v1",
"id": "CVE-2024-43860-4c0436ea"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/remoteproc/imx_rproc.c",
"function": "imx_rproc_addr_init"
},
"digest": {
"length": 1481.0,
"function_hash": "217195452551316729348448008989260037855"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6b50462b473fdccdc0dfad73001147e40ff19a66",
"signature_version": "v1",
"id": "CVE-2024-43860-75883caa"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/remoteproc/imx_rproc.c"
},
"digest": {
"line_hashes": [
"44624784301929218347937977959696355982",
"296909900779541927240026803507580830285",
"259433784848351103110805065425647369065",
"157573331491911590791793137253073301080"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6c9ea3547fad252fe9ae5d3ed7e066e2085bf3a2",
"signature_version": "v1",
"id": "CVE-2024-43860-bf1b21b3"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/remoteproc/imx_rproc.c",
"function": "imx_rproc_addr_init"
},
"digest": {
"length": 1748.0,
"function_hash": "161961382897050781770296727888778932389"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6c9ea3547fad252fe9ae5d3ed7e066e2085bf3a2",
"signature_version": "v1",
"id": "CVE-2024-43860-d4724437"
}
]