In the Linux kernel, the following vulnerability has been resolved:
remoteproc: k3-r5: Fix error handling when power-up failed
By simply bailing out, the driver was violating its rule and internal assumptions that either both or no rproc should be initialized. E.g., this could cause the first core to be available but not the second one, leading to crashes on its shutdown later on while trying to dereference that second instance.
[ { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@afd102bde99d90ef41e043c846ea34b04433eb7b", "signature_version": "v1", "target": { "file": "drivers/remoteproc/ti_k3_r5_remoteproc.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "140425290935441853171064356482451239211", "294785428481232550563247749727788957983", "314986445072642412983537440624662327422", "264457927584748018710462603936151592342", "43217260950192970561112522836408674764", "185107420353241017056038679731428322094", "24627830819236394664880306501931565245" ] }, "id": "CVE-2024-50176-119074a9" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7afb5e3aa989c479979faeb18768a67889a7a9c6", "signature_version": "v1", "target": { "file": "drivers/remoteproc/ti_k3_r5_remoteproc.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "140425290935441853171064356482451239211", "294785428481232550563247749727788957983", "314986445072642412983537440624662327422", "264457927584748018710462603936151592342", "43217260950192970561112522836408674764", "185107420353241017056038679731428322094", "24627830819236394664880306501931565245" ] }, "id": "CVE-2024-50176-18d90846" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@afd102bde99d90ef41e043c846ea34b04433eb7b", "signature_version": "v1", "target": { "function": "k3_r5_cluster_rproc_init", "file": "drivers/remoteproc/ti_k3_r5_remoteproc.c" }, "digest": { "function_hash": "219239812737522055007395854460548357766", "length": 2076.0 }, "id": "CVE-2024-50176-38b6a354" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fc71c23958931713b5e76f317b76be37189f2516", "signature_version": "v1", "target": { "file": "drivers/remoteproc/ti_k3_r5_remoteproc.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "140425290935441853171064356482451239211", "294785428481232550563247749727788957983", "314986445072642412983537440624662327422", "264457927584748018710462603936151592342", "43217260950192970561112522836408674764", "185107420353241017056038679731428322094", "24627830819236394664880306501931565245" ] }, "id": "CVE-2024-50176-4cb6286b" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@87ab3af7447791d0c619610fd560bd804549e187", "signature_version": "v1", "target": { "function": "k3_r5_cluster_rproc_init", "file": "drivers/remoteproc/ti_k3_r5_remoteproc.c" }, "digest": { "function_hash": "273085204442868632518820768340518543837", "length": 2034.0 }, "id": "CVE-2024-50176-8529b5cc" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7afb5e3aa989c479979faeb18768a67889a7a9c6", "signature_version": "v1", "target": { "function": "k3_r5_cluster_rproc_init", "file": "drivers/remoteproc/ti_k3_r5_remoteproc.c" }, "digest": { "function_hash": "219239812737522055007395854460548357766", "length": 2076.0 }, "id": "CVE-2024-50176-b0a0f79d" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9ab27eb5866ccbf57715cfdba4b03d57776092fb", "signature_version": "v1", "target": { "function": "k3_r5_cluster_rproc_init", "file": "drivers/remoteproc/ti_k3_r5_remoteproc.c" }, "digest": { "function_hash": "287504270009656668168143127750210835903", "length": 2052.0 }, "id": "CVE-2024-50176-cb4f4ac1" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9ab27eb5866ccbf57715cfdba4b03d57776092fb", "signature_version": "v1", "target": { "file": "drivers/remoteproc/ti_k3_r5_remoteproc.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "140425290935441853171064356482451239211", "294785428481232550563247749727788957983", "314986445072642412983537440624662327422", "264457927584748018710462603936151592342", "43217260950192970561112522836408674764", "185107420353241017056038679731428322094", "24627830819236394664880306501931565245" ] }, "id": "CVE-2024-50176-cbb1839a" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@87ab3af7447791d0c619610fd560bd804549e187", "signature_version": "v1", "target": { "file": "drivers/remoteproc/ti_k3_r5_remoteproc.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "140425290935441853171064356482451239211", "294785428481232550563247749727788957983", "314986445072642412983537440624662327422", "264457927584748018710462603936151592342", "43217260950192970561112522836408674764", "185107420353241017056038679731428322094", "24627830819236394664880306501931565245" ] }, "id": "CVE-2024-50176-d3d52fa5" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fc71c23958931713b5e76f317b76be37189f2516", "signature_version": "v1", "target": { "function": "k3_r5_cluster_rproc_init", "file": "drivers/remoteproc/ti_k3_r5_remoteproc.c" }, "digest": { "function_hash": "219239812737522055007395854460548357766", "length": 2076.0 }, "id": "CVE-2024-50176-ed9948b6" } ]