Lucene search

K
vulnrichmentLinuxVULNRICHMENT:CVE-2023-52871
HistoryMay 21, 2024 - 3:32 p.m.

CVE-2023-52871 soc: qcom: llcc: Handle a second device without data corruption

2024-05-2115:32:00
Linux
github.com
3
linux kernel
vulnerability
soc
qcom
llcc
data corruption

AI Score

6.8

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: llcc: Handle a second device without data corruption

Usually there is only one llcc device. But if there were a second, even
a failed probe call would modify the global drv_data pointer. So check
if drv_data is valid before overwriting it.

CNA Affected

[
  {
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "vendor": "Linux",
    "product": "Linux",
    "versions": [
      {
        "status": "affected",
        "version": "a3134fb09e0b",
        "lessThan": "cc1a1dcb411f",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "a3134fb09e0b",
        "lessThan": "5e5b85ea0f4b",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "a3134fb09e0b",
        "lessThan": "995ee1e84e8d",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "a3134fb09e0b",
        "lessThan": "f0ef883cae30",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "a3134fb09e0b",
        "lessThan": "3565684309e5",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "a3134fb09e0b",
        "lessThan": "1143bfb9b055",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "a3134fb09e0b",
        "lessThan": "f1a1bc8775b2",
        "versionType": "git"
      }
    ],
    "programFiles": [
      "drivers/soc/qcom/llcc-qcom.c"
    ],
    "defaultStatus": "unaffected"
  },
  {
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "vendor": "Linux",
    "product": "Linux",
    "versions": [
      {
        "status": "affected",
        "version": "4.19"
      },
      {
        "status": "unaffected",
        "version": "0",
        "lessThan": "4.19",
        "versionType": "custom"
      },
      {
        "status": "unaffected",
        "version": "5.4.261",
        "versionType": "custom",
        "lessThanOrEqual": "5.4.*"
      },
      {
        "status": "unaffected",
        "version": "5.10.201",
        "versionType": "custom",
        "lessThanOrEqual": "5.10.*"
      },
      {
        "status": "unaffected",
        "version": "5.15.139",
        "versionType": "custom",
        "lessThanOrEqual": "5.15.*"
      },
      {
        "status": "unaffected",
        "version": "6.1.63",
        "versionType": "custom",
        "lessThanOrEqual": "6.1.*"
      },
      {
        "status": "unaffected",
        "version": "6.5.12",
        "versionType": "custom",
        "lessThanOrEqual": "6.5.*"
      },
      {
        "status": "unaffected",
        "version": "6.6.2",
        "versionType": "custom",
        "lessThanOrEqual": "6.6.*"
      },
      {
        "status": "unaffected",
        "version": "6.7",
        "versionType": "original_commit_for_fix",
        "lessThanOrEqual": "*"
      }
    ],
    "programFiles": [
      "drivers/soc/qcom/llcc-qcom.c"
    ],
    "defaultStatus": "affected"
  }
]

AI Score

6.8

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial