CVE-2023-52806

In the Linux kernel, the following vulnerability has been resolved: ALSA: hda: Fix possible null-ptr-deref when assigning a stream While AudioDSP drivers assign streams exclusively of HOST or LINK type, nothing blocks a user to attempt to assign a COUPLED stream. As supplied substream instance may be a stub, what is the case when code-loading, such scenario ends with null-ptr-deref.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/2527775616f3638f4fd54649eba8c7b84d5e4250 - Patch () https://git.kernel.org/stable/c/2527775616f3638f4fd54649eba8c7b84d5e4250 - Patch
References () https://git.kernel.org/stable/c/25354bae4fc310c3928e8a42fda2d486f67745d7 - Patch () https://git.kernel.org/stable/c/25354bae4fc310c3928e8a42fda2d486f67745d7 - Patch
References () https://git.kernel.org/stable/c/43b91df291c8802268ab3cfd8fccfdf135800ed4 - Patch () https://git.kernel.org/stable/c/43b91df291c8802268ab3cfd8fccfdf135800ed4 - Patch
References () https://git.kernel.org/stable/c/4a320da7f7cbdab2098b103c47f45d5061f42edd - Patch () https://git.kernel.org/stable/c/4a320da7f7cbdab2098b103c47f45d5061f42edd - Patch
References () https://git.kernel.org/stable/c/631a96e9eb4228ff75fce7e72d133ca81194797e - Patch () https://git.kernel.org/stable/c/631a96e9eb4228ff75fce7e72d133ca81194797e - Patch
References () https://git.kernel.org/stable/c/758c7733cb821041f5fd403b7b97c0b95d319323 - Patch () https://git.kernel.org/stable/c/758c7733cb821041f5fd403b7b97c0b95d319323 - Patch
References () https://git.kernel.org/stable/c/7de25112de8222fd20564769e6c99dc9f9738a0b - Patch () https://git.kernel.org/stable/c/7de25112de8222fd20564769e6c99dc9f9738a0b - Patch
References () https://git.kernel.org/stable/c/f93dc90c2e8ed664985e366aa6459ac83cdab236 - Patch () https://git.kernel.org/stable/c/f93dc90c2e8ed664985e366aa6459ac83cdab236 - Patch
References () https://git.kernel.org/stable/c/fe7c1a0c2b25c82807cb46fc3aadbf2664a682b0 - Patch () https://git.kernel.org/stable/c/fe7c1a0c2b25c82807cb46fc3aadbf2664a682b0 - Patch

24 May 2024, 01:14

Type Values Removed Values Added
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: ALSA: hda: Corrige posible null-ptr-deref al asignar un flujo. Si bien los controladores AudioDSP asignan flujos exclusivamente de tipo HOST o LINK, nada impide que un usuario intente asignar un flujo ACOPLADO. Como la instancia de subsecuencia proporcionada puede ser un código auxiliar, cuál es el caso cuando se carga el código, dicho escenario termina con null-ptr-deref.
References () https://git.kernel.org/stable/c/2527775616f3638f4fd54649eba8c7b84d5e4250 - () https://git.kernel.org/stable/c/2527775616f3638f4fd54649eba8c7b84d5e4250 - Patch
References () https://git.kernel.org/stable/c/25354bae4fc310c3928e8a42fda2d486f67745d7 - () https://git.kernel.org/stable/c/25354bae4fc310c3928e8a42fda2d486f67745d7 - Patch
References () https://git.kernel.org/stable/c/43b91df291c8802268ab3cfd8fccfdf135800ed4 - () https://git.kernel.org/stable/c/43b91df291c8802268ab3cfd8fccfdf135800ed4 - Patch
References () https://git.kernel.org/stable/c/4a320da7f7cbdab2098b103c47f45d5061f42edd - () https://git.kernel.org/stable/c/4a320da7f7cbdab2098b103c47f45d5061f42edd - Patch
References () https://git.kernel.org/stable/c/631a96e9eb4228ff75fce7e72d133ca81194797e - () https://git.kernel.org/stable/c/631a96e9eb4228ff75fce7e72d133ca81194797e - Patch
References () https://git.kernel.org/stable/c/758c7733cb821041f5fd403b7b97c0b95d319323 - () https://git.kernel.org/stable/c/758c7733cb821041f5fd403b7b97c0b95d319323 - Patch
References () https://git.kernel.org/stable/c/7de25112de8222fd20564769e6c99dc9f9738a0b - () https://git.kernel.org/stable/c/7de25112de8222fd20564769e6c99dc9f9738a0b - Patch
References () https://git.kernel.org/stable/c/f93dc90c2e8ed664985e366aa6459ac83cdab236 - () https://git.kernel.org/stable/c/f93dc90c2e8ed664985e366aa6459ac83cdab236 - Patch
References () https://git.kernel.org/stable/c/fe7c1a0c2b25c82807cb46fc3aadbf2664a682b0 - () https://git.kernel.org/stable/c/fe7c1a0c2b25c82807cb46fc3aadbf2664a682b0 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 16:15

Updated : 2024-11-21 08:40


NVD link : CVE-2023-52806

Mitre link : CVE-2023-52806

CVE.ORG link : CVE-2023-52806


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference