CVE-2023-54282 — Incorrect Calculation of Buffer Size in Linux
Severity
3.3LOW
No vectorEPSS
0.0%
top 86.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
media: tuners: qt1010: replace BUG_ON with a regular error
BUG_ON is unnecessary here, and in addition it confuses smatch.
Replacing this with an error return help resolve this smatch
warning:
drivers/media/tuners/qt1010.c:350 qt1010_init() error: buffer overflow 'i2c_data' 34 <= 34
Affected Packages4 packages
▶CVEListV5linux/linux4682b58e5af01ee856a706083eac71238fb69cd0 — 6cae780862d221106626b2b5fb21a197f398c6ec+8
🔴Vulnerability Details
3OSV▶
CVE-2023-54282: In the Linux kernel, the following vulnerability has been resolved: media: tuners: qt1010: replace BUG_ON with a regular error BUG_ON is unnecessary h↗2025-12-30
GHSA▶
GHSA-6cxv-3w9c-fphw: In the Linux kernel, the following vulnerability has been resolved:
media: tuners: qt1010: replace BUG_ON with a regular error
BUG_ON is unnecessary↗2025-12-30