CVE-2023-52916

Source
https://cve.org/CVERecord?id=CVE-2023-52916
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52916.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52916
Downstream
Related
Published
2024-09-06T09:07:50.462Z
Modified
2026-03-20T12:32:52.775637Z
Summary
media: aspeed: Fix memory overwrite if timing is 1600x900
Details

In the Linux kernel, the following vulnerability has been resolved:

media: aspeed: Fix memory overwrite if timing is 1600x900

When capturing 1600x900, system could crash when system memory usage is tight.

The way to reproduce this issue: 1. Use 1600x900 to display on host 2. Mount ISO through 'Virtual media' on OpenBMC's web 3. Run script as below on host to do sha continuously #!/bin/bash while [ [1] ]; do find /media -type f -printf '"%h/%f"\n' | xargs sha256sum done 4. Open KVM on OpenBMC's web

The size of macro block captured is 8x8. Therefore, we should make sure the height of src-buf is 8 aligned to fix this issue.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52916.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d2b4387f3bdf016e266d23cf657465f557721488
Fixed
4c823e4027dd1d6e88c31028dec13dd19bc7b02d
Fixed
c281355068bc258fd619c5aefd978595bede7bfe

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52916.json"