CVE-2023-53400

In the Linux kernel, the following vulnerability has been resolved: ALSA: hda: Fix Oops by 9.1 surround channel names get_line_out_pfx() may trigger an Oops by overflowing the static array with more than 8 channels. This was reported for MacBookPro 12,1 with Cirrus codec. As a workaround, extend for the 9.1 channels and also fix the potential Oops by unifying the code paths accessing the same array with the proper size check.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.4:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.4:rc2:*:*:*:*:*:*

History

12 Dec 2025, 20:27

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.4:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.4:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/082dcd51667b29097500c824c37f24da997a6a8a - () https://git.kernel.org/stable/c/082dcd51667b29097500c824c37f24da997a6a8a - Patch
References () https://git.kernel.org/stable/c/3b44ec8c5c44790a82f07e90db45643c762878c6 - () https://git.kernel.org/stable/c/3b44ec8c5c44790a82f07e90db45643c762878c6 - Patch
References () https://git.kernel.org/stable/c/4ef155ddf9578bf035964d58739fdcd7dd44b4a4 - () https://git.kernel.org/stable/c/4ef155ddf9578bf035964d58739fdcd7dd44b4a4 - Patch
References () https://git.kernel.org/stable/c/546b1f5f45a355ae0d3a8041cdaca597dfcac825 - () https://git.kernel.org/stable/c/546b1f5f45a355ae0d3a8041cdaca597dfcac825 - Patch
References () https://git.kernel.org/stable/c/b5694aae4c2d9a288bafce7d38f122769e0428e6 - () https://git.kernel.org/stable/c/b5694aae4c2d9a288bafce7d38f122769e0428e6 - Patch
References () https://git.kernel.org/stable/c/dc8c569d59f17b17d7bca4f68c36bd571659921e - () https://git.kernel.org/stable/c/dc8c569d59f17b17d7bca4f68c36bd571659921e - Patch
References () https://git.kernel.org/stable/c/e8c7d7c43d5edd20e518fe1dfb2371d1fe6e8bb8 - () https://git.kernel.org/stable/c/e8c7d7c43d5edd20e518fe1dfb2371d1fe6e8bb8 - Patch
References () https://git.kernel.org/stable/c/fcf637461019e9a5a0c12fc5c42a9db1779b0634 - () https://git.kernel.org/stable/c/fcf637461019e9a5a0c12fc5c42a9db1779b0634 - Patch
First Time Linux
Linux linux Kernel

18 Sep 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-18 14:15

Updated : 2025-12-12 20:27


NVD link : CVE-2023-53400

Mitre link : CVE-2023-53400

CVE.ORG link : CVE-2023-53400


JSON object : View

Products Affected

linux

  • linux_kernel