CVE-2024-53061

Source
https://cve.org/CVERecord?id=CVE-2024-53061
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53061.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53061
Downstream
Related
Published
2024-11-19T17:22:32.189Z
Modified
2026-03-11T07:52:01.436044Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
media: s5p-jpeg: prevent buffer overflows
Details

In the Linux kernel, the following vulnerability has been resolved:

media: s5p-jpeg: prevent buffer overflows

The current logic allows word to be less than 2. If this happens, there will be buffer overflows, as reported by smatch. Add extra checks to prevent it.

While here, remove an unused word = 0 assignment.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53061.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6c96dbbc2aa9f5b4aed8792989d69eae22bf77c4
Fixed
c5f6fefcda8fac8f082b6c5bf416567f4e100c51
Fixed
e5117f6e7adcf9fd7546cdd0edc9abe4474bc98b
Fixed
f54e8e1e39dacccebcfb9a9a36f0552a0a97e2ef
Fixed
a930cddfd153b5d4401df0c01effa14c831ff21e
Fixed
c85db2d4432de4ff9d97006691ce2dcb5bda660e
Fixed
784bc785a453eb2f8433dd62075befdfa1b2d6fd
Fixed
c951a0859fdacf49a2298b5551a7e52b95ff6f51
Fixed
14a22762c3daeac59a5a534e124acbb4d7a79b3a

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53061.json"