๐Ÿ” CVE Alert

CVE-2023-52916

UNKNOWN 0.0

media: aspeed: Fix memory overwrite if timing is 1600x900

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: media: aspeed: Fix memory overwrite if timing is 1600x900 When capturing 1600x900, system could crash when system memory usage is tight. The way to reproduce this issue: 1. Use 1600x900 to display on host 2. Mount ISO through 'Virtual media' on OpenBMC's web 3. Run script as below on host to do sha continuously #!/bin/bash while [ [1] ]; do find /media -type f -printf '"%h/%f"\n' | xargs sha256sum done 4. Open KVM on OpenBMC's web The size of macro block captured is 8x8. Therefore, we should make sure the height of src-buf is 8 aligned to fix this issue.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 6, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d2b4387f3bdf016e266d23cf657465f557721488 < 4c823e4027dd1d6e88c31028dec13dd19bc7b02d d2b4387f3bdf016e266d23cf657465f557721488 < c281355068bc258fd619c5aefd978595bede7bfe
Linux / Linux
5.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/4c823e4027dd1d6e88c31028dec13dd19bc7b02d git.kernel.org: https://git.kernel.org/stable/c/c281355068bc258fd619c5aefd978595bede7bfe lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html