CVE-2023-52857

In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: Fix coverity issue with unintentional integer overflow 1. Instead of multiplying 2 variable of different types. Change to assign a value of one variable and then multiply the other variable. 2. Add a int variable for multiplier calculation instead of calculating different types multiplier with dma_addr_t variable directly.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

28 Mar 2025, 22:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/a12bd675100531f9fb4508fd4430dd1632325a0e -

03 Feb 2025, 16:13

Type Values Removed Values Added
CWE CWE-190
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0d8a1df39d3fc34560e2cc663b5c340d06a25396 - () https://git.kernel.org/stable/c/0d8a1df39d3fc34560e2cc663b5c340d06a25396 - Patch
References () https://git.kernel.org/stable/c/96312a251d4dcee5d36e32edba3002bfde0ddd9c - () https://git.kernel.org/stable/c/96312a251d4dcee5d36e32edba3002bfde0ddd9c - Patch
References () https://git.kernel.org/stable/c/b0b0d811eac6b4c52cb9ad632fa6384cf48869e7 - () https://git.kernel.org/stable/c/b0b0d811eac6b4c52cb9ad632fa6384cf48869e7 - Patch

21 Nov 2024, 08:40

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: drm/mediatek: soluciona el problema de cobertura con desbordamiento de enteros involuntario 1. En lugar de multiplicar 2 variables de diferentes tipos. Cambie para asignar un valor a una variable y luego multiplique la otra variable. 2. Agregue una variable int para el cálculo del multiplicador en lugar de calcular diferentes tipos de multiplicadores con la variable dma_addr_t directamente.
References () https://git.kernel.org/stable/c/0d8a1df39d3fc34560e2cc663b5c340d06a25396 - () https://git.kernel.org/stable/c/0d8a1df39d3fc34560e2cc663b5c340d06a25396 -
References () https://git.kernel.org/stable/c/96312a251d4dcee5d36e32edba3002bfde0ddd9c - () https://git.kernel.org/stable/c/96312a251d4dcee5d36e32edba3002bfde0ddd9c -
References () https://git.kernel.org/stable/c/b0b0d811eac6b4c52cb9ad632fa6384cf48869e7 - () https://git.kernel.org/stable/c/b0b0d811eac6b4c52cb9ad632fa6384cf48869e7 -

21 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 16:15

Updated : 2025-03-28 22:15


NVD link : CVE-2023-52857

Mitre link : CVE-2023-52857

CVE.ORG link : CVE-2023-52857


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound