CVE-2023-52697

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52697
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52697.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52697
Downstream
Related
Published
2024-05-17T14:27:29Z
Modified
2025-10-08T16:22:50.686274Z
Summary
ASoC: Intel: sof_sdw_rt_sdca_jack_common: ctx->headset_codec_dev = NULL
Details

In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: sofsdwrtsdcajackcommon: ctx->headsetcodec_dev = NULL

sofsdwrtsdcajackexit() are used by different codecs, and some of them use the same dai name. For example, rt712 and rt713 both use "rt712-sdca-aif1" and sofsdwrtsdcajackexit(). As a result, sofsdwrtsdcajackexit() will be called twice by mcdailinkexitloop(). Set ctx->headsetcodecdev = NULL; after putdevice(ctx->headsetcodecdev); to avoid ctx->headsetcodec_dev being put twice.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5360c67046385f90406ec17e367ba9aeb42d5459
Fixed
a410d58117d6da4b7d41f3c91365f191d006bc3d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5360c67046385f90406ec17e367ba9aeb42d5459
Fixed
582231a8c4f73ac153493687ecc1bed853e9c9ef
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5360c67046385f90406ec17e367ba9aeb42d5459
Fixed
e38e252dbceeef7d2f848017132efd68e9ae1416

Affected versions

v6.*

v6.4
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.2
v6.6.3
v6.6.4
v6.6.5
v6.6.6
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.7.1

Database specific

{
    "vanir_signatures": [
        {
            "id": "CVE-2023-52697-021e8e12",
            "deprecated": false,
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "268301329510358795602687712594664559160",
                    "289139211793773579354949716473235328770",
                    "274504138999937174086636295478964336800",
                    "5707105841147788846904052981578008187"
                ]
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a410d58117d6da4b7d41f3c91365f191d006bc3d",
            "target": {
                "file": "sound/soc/intel/boards/sof_sdw_rt_sdca_jack_common.c"
            },
            "signature_type": "Line",
            "signature_version": "v1"
        },
        {
            "id": "CVE-2023-52697-6098163b",
            "deprecated": false,
            "digest": {
                "function_hash": "250947169721050230445251503249072859380",
                "length": 270.0
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e38e252dbceeef7d2f848017132efd68e9ae1416",
            "target": {
                "file": "sound/soc/intel/boards/sof_sdw_rt_sdca_jack_common.c",
                "function": "sof_sdw_rt_sdca_jack_exit"
            },
            "signature_type": "Function",
            "signature_version": "v1"
        },
        {
            "id": "CVE-2023-52697-ea6a28ab",
            "deprecated": false,
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "268301329510358795602687712594664559160",
                    "289139211793773579354949716473235328770",
                    "274504138999937174086636295478964336800",
                    "5707105841147788846904052981578008187"
                ]
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e38e252dbceeef7d2f848017132efd68e9ae1416",
            "target": {
                "file": "sound/soc/intel/boards/sof_sdw_rt_sdca_jack_common.c"
            },
            "signature_type": "Line",
            "signature_version": "v1"
        },
        {
            "id": "CVE-2023-52697-fac92bc9",
            "deprecated": false,
            "digest": {
                "function_hash": "250947169721050230445251503249072859380",
                "length": 270.0
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a410d58117d6da4b7d41f3c91365f191d006bc3d",
            "target": {
                "file": "sound/soc/intel/boards/sof_sdw_rt_sdca_jack_common.c",
                "function": "sof_sdw_rt_sdca_jack_exit"
            },
            "signature_type": "Function",
            "signature_version": "v1"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.5.0
Fixed
6.6.14
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.2