In the Linux kernel, the following vulnerability has been resolved:
ALSA: hda: Fix possible null-ptr-deref when assigning a stream
While AudioDSP drivers assign streams exclusively of HOST or LINK type, nothing blocks a user to attempt to assign a COUPLED stream. As supplied substream instance may be a stub, what is the case when code-loading, such scenario ends with null-ptr-deref.
{ "vanir_signatures": [ { "signature_type": "Line", "deprecated": false, "signature_version": "v1", "digest": { "line_hashes": [ "118989989130629333542061386832419244989", "210808955191823033147186905882340706683", "336082806638118554981591576556291096258", "261181826124219025063289547784303091543", "43587521933412878163410988665158405726" ], "threshold": 0.9 }, "id": "CVE-2023-52806-174aeaf3", "target": { "file": "sound/hda/hdac_stream.c" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7de25112de8222fd20564769e6c99dc9f9738a0b" }, { "signature_type": "Line", "deprecated": false, "signature_version": "v1", "digest": { "line_hashes": [ "118989989130629333542061386832419244989", "210808955191823033147186905882340706683", "336082806638118554981591576556291096258", "261181826124219025063289547784303091543", "43587521933412878163410988665158405726" ], "threshold": 0.9 }, "id": "CVE-2023-52806-360471f5", "target": { "file": "sound/hda/hdac_stream.c" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@758c7733cb821041f5fd403b7b97c0b95d319323" }, { "signature_type": "Function", "deprecated": false, "signature_version": "v1", "digest": { "length": 639.0, "function_hash": "301280421402023352273111924046656871104" }, "id": "CVE-2023-52806-51975fd1", "target": { "file": "sound/hda/hdac_stream.c", "function": "snd_hdac_stream_assign" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2527775616f3638f4fd54649eba8c7b84d5e4250" }, { "signature_type": "Function", "deprecated": false, "signature_version": "v1", "digest": { "length": 639.0, "function_hash": "273033650170044089866809370782508490490" }, "id": "CVE-2023-52806-9ed66d46", "target": { "file": "sound/hda/hdac_stream.c", "function": "snd_hdac_stream_assign" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@758c7733cb821041f5fd403b7b97c0b95d319323" }, { "signature_type": "Line", "deprecated": false, "signature_version": "v1", "digest": { "line_hashes": [ "118989989130629333542061386832419244989", "210808955191823033147186905882340706683", "270556874252701766272994599076208702578", "202251385452036750582979766257247427014", "49043907157360731697255282765443422646" ], "threshold": 0.9 }, "id": "CVE-2023-52806-a64799fc", "target": { "file": "sound/hda/hdac_stream.c" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2527775616f3638f4fd54649eba8c7b84d5e4250" }, { "signature_type": "Function", "deprecated": false, "signature_version": "v1", "digest": { "length": 639.0, "function_hash": "273033650170044089866809370782508490490" }, "id": "CVE-2023-52806-dda2a9b0", "target": { "file": "sound/hda/hdac_stream.c", "function": "snd_hdac_stream_assign" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7de25112de8222fd20564769e6c99dc9f9738a0b" } ] }