cve-2023-52916
Vulnerability from cvelistv5
Published
2024-09-06 09:07
Modified
2024-12-19 08:28
Severity ?
EPSS score ?
Summary
media: aspeed: Fix memory overwrite if timing is 1600x900
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52916", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-09T20:43:04.212290Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-29T13:22:28.595Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/media/platform/aspeed/aspeed-video.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "4c823e4027dd1d6e88c31028dec13dd19bc7b02d", "status": "affected", "version": "d2b4387f3bdf016e266d23cf657465f557721488", "versionType": "git" }, { "lessThan": "c281355068bc258fd619c5aefd978595bede7bfe", "status": "affected", "version": "d2b4387f3bdf016e266d23cf657465f557721488", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/media/platform/aspeed/aspeed-video.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.0" }, { "lessThan": "5.0", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.120", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.6", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: aspeed: Fix memory overwrite if timing is 1600x900\n\nWhen capturing 1600x900, system could crash when system memory usage is\ntight.\n\nThe way to reproduce this issue:\n1. Use 1600x900 to display on host\n2. Mount ISO through \u0027Virtual media\u0027 on OpenBMC\u0027s web\n3. Run script as below on host to do sha continuously\n #!/bin/bash\n while [ [1] ];\n do\n\tfind /media -type f -printf \u0027\"%h/%f\"\\n\u0027 | xargs sha256sum\n done\n4. Open KVM on OpenBMC\u0027s web\n\nThe size of macro block captured is 8x8. Therefore, we should make sure\nthe height of src-buf is 8 aligned to fix this issue." } ], "providerMetadata": { "dateUpdated": "2024-12-19T08:28:30.223Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/4c823e4027dd1d6e88c31028dec13dd19bc7b02d" }, { "url": "https://git.kernel.org/stable/c/c281355068bc258fd619c5aefd978595bede7bfe" } ], "title": "media: aspeed: Fix memory overwrite if timing is 1600x900", "x_generator": { "engine": "bippy-5f407fcff5a0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2023-52916", "datePublished": "2024-09-06T09:07:50.462Z", "dateReserved": "2024-08-21T06:07:11.017Z", "dateUpdated": "2024-12-19T08:28:30.223Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-52916\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-09-06T09:15:03.327\",\"lastModified\":\"2024-12-14T21:15:16.370\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmedia: aspeed: Fix memory overwrite if timing is 1600x900\\n\\nWhen capturing 1600x900, system could crash when system memory usage is\\ntight.\\n\\nThe way to reproduce this issue:\\n1. Use 1600x900 to display on host\\n2. Mount ISO through \u0027Virtual media\u0027 on OpenBMC\u0027s web\\n3. Run script as below on host to do sha continuously\\n #!/bin/bash\\n while [ [1] ];\\n do\\n\\tfind /media -type f -printf \u0027\\\"%h/%f\\\"\\\\n\u0027 | xargs sha256sum\\n done\\n4. Open KVM on OpenBMC\u0027s web\\n\\nThe size of macro block captured is 8x8. Therefore, we should make sure\\nthe height of src-buf is 8 aligned to fix this issue.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: aspeed: corrige la sobrescritura de memoria si el tiempo es 1600x900 Al capturar 1600x900, el sistema podr\u00eda bloquearse cuando el uso de la memoria del sistema es ajustado. La forma de reproducir este problema: 1. Use 1600x900 para mostrar en el host 2. Monte ISO a trav\u00e9s de \u0027Medios virtuales\u0027 en la web de OpenBMC 3. Ejecute el script como se muestra a continuaci\u00f3n en el host para hacer sha continuamente #!/bin/bash while [ [1] ]; do find /media -type f -printf \u0027\\\"%h/%f\\\"\\\\n\u0027 | xargs sha256sum done 4. Abra KVM en la web de OpenBMC El tama\u00f1o del bloque de macro capturado es 8x8. Por lo tanto, debemos asegurarnos de que la altura de src-buf est\u00e9 alineada con 8 para solucionar este problema.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/4c823e4027dd1d6e88c31028dec13dd19bc7b02d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c281355068bc258fd619c5aefd978595bede7bfe\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.