CVE-2023-54222Out-of-bounds Read in Linux

CWE-125Out-of-bounds Read7 documents6 sources
Severity
5.1MEDIUM
No vector
EPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: hte: tegra-194: Fix off by one in tegra_hte_map_to_line_id() The "map_sz" is the number of elements in the "m" array so the > comparison needs to be changed to >= to prevent an out of bounds read.

Affected Packages4 packages

Linuxlinux/linux_kernel5.19.06.1.28+2
Debianlinux/linux_kernel< 6.1.37-1+2
CVEListV5linux/linux09574cca6ad649f84ba804caf63a5aefe0202834fed87ce073c7b9f4f255105f90bd930df06d18a7+4
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-54222: In the Linux kernel, the following vulnerability has been resolved: hte: tegra-194: Fix off by one in tegra_hte_map_to_line_id() The "map_sz" is the n2025-12-30
GHSA
GHSA-v7c6-475j-qrqg: In the Linux kernel, the following vulnerability has been resolved: hte: tegra-194: Fix off by one in tegra_hte_map_to_line_id() The "map_sz" is the2025-12-30
OSV
hte: tegra-194: Fix off by one in tegra_hte_map_to_line_id()2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: Linux kernel: Information disclosure or denial of service via out-of-bounds read in Tegra Host Emulation2025-12-30
Debian
CVE-2023-54222: linux - In the Linux kernel, the following vulnerability has been resolved: hte: tegra-...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54222 Impact, Exploitability, and Mitigation Steps | Wiz