CVE-2023-52916
Sept. 6, 2024, 12:08 p.m.
None
No Score
Description
In the Linux kernel, the following vulnerability has been resolved:
media: aspeed: Fix memory overwrite if timing is 1600x900
When capturing 1600x900, system could crash when system memory usage is
tight.
The way to reproduce this issue:
1. Use 1600x900 to display on host
2. Mount ISO through 'Virtual media' on OpenBMC's web
3. Run script as below on host to do sha continuously
#!/bin/bash
while [ [1] ];
do
find /media -type f -printf '"%h/%f"\n' | xargs sha256sum
done
4. Open KVM on OpenBMC's web
The size of macro block captured is 8x8. Therefore, we should make sure
the height of src-buf is 8 aligned to fix this issue.
Product(s) Impacted
| Product | Versions |
|---|---|
| Linux kernel |
|
| OpenBMC |
|
Weaknesses
Common security weaknesses mapped to this vulnerability.
Tags
Timeline
Published: Sept. 6, 2024, 9:15 a.m.
Last Modified: Sept. 6, 2024, 12:08 p.m.
Last Modified: Sept. 6, 2024, 12:08 p.m.
Status : Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
416baaa9-dc9f-4396-8d5f-8c081fb06d67
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.