CVE-2023-52916

In the Linux kernel, the following vulnerability has been resolved: media: aspeed: Fix memory overwrite if timing is 1600x900 When capturing 1600x900, system could crash when system memory usage is tight. The way to reproduce this issue: 1. Use 1600x900 to display on host 2. Mount ISO through 'Virtual media' on OpenBMC's web 3. Run script as below on host to do sha continuously #!/bin/bash while [ [1] ]; do find /media -type f -printf '"%h/%f"\n' | xargs sha256sum done 4. Open KVM on OpenBMC's web The size of macro block captured is 8x8. Therefore, we should make sure the height of src-buf is 8 aligned to fix this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Nov 2025, 21:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html -

26 Sep 2025, 18:50

Type Values Removed Values Added
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/4c823e4027dd1d6e88c31028dec13dd19bc7b02d - () https://git.kernel.org/stable/c/4c823e4027dd1d6e88c31028dec13dd19bc7b02d - Patch
References () https://git.kernel.org/stable/c/c281355068bc258fd619c5aefd978595bede7bfe - () https://git.kernel.org/stable/c/c281355068bc258fd619c5aefd978595bede7bfe - Patch

14 Dec 2024, 21:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: aspeed: corrige la sobrescritura de memoria si el tiempo es 1600x900 Al capturar 1600x900, el sistema podría bloquearse cuando el uso de la memoria del sistema es ajustado. La forma de reproducir este problema: 1. Use 1600x900 para mostrar en el host 2. Monte ISO a través de 'Medios virtuales' en la web de OpenBMC 3. Ejecute el script como se muestra a continuación en el host para hacer sha continuamente #!/bin/bash while [ [1] ]; do find /media -type f -printf '"%h/%f"\n' | xargs sha256sum done 4. Abra KVM en la web de OpenBMC El tamaño del bloque de macro capturado es 8x8. Por lo tanto, debemos asegurarnos de que la altura de src-buf esté alineada con 8 para solucionar este problema.
References
  • () https://git.kernel.org/stable/c/4c823e4027dd1d6e88c31028dec13dd19bc7b02d -

06 Sep 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-06 09:15

Updated : 2025-11-03 21:16


NVD link : CVE-2023-52916

Mitre link : CVE-2023-52916

CVE.ORG link : CVE-2023-52916


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write