CVE-2023-54284Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 84.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: media: av7110: prevent underflow in write_ts_to_decoder() The buf[4] value comes from the user via ts_play(). It is a value in the u8 range. The final length we pass to av7110_ipack_instant_repack() is "len - (buf[4] + 1) - 4" so add a check to ensure that the length is not negative. It's not clear that passing a negative len value does anything bad necessarily, but it's not best practice. With the new bounds checking the "if

Affected Packages4 packages

Linuxlinux/linux_kernel2.6.314.14.315+7
Debianlinux/linux_kernel< 5.10.216-1+3
CVEListV5linux/linuxfd46d16d602ab7fd53cef7ff55b9dcb0b47ad3bf6680af5be9f08d830567e9118f76d3e64684db8f+9
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-rj9v-3cx4-5wvc: In the Linux kernel, the following vulnerability has been resolved: media: av7110: prevent underflow in write_ts_to_decoder() The buf[4] value comes2025-12-30
OSV
CVE-2023-54284: In the Linux kernel, the following vulnerability has been resolved: media: av7110: prevent underflow in write_ts_to_decoder() The buf[4] value comes f2025-12-30
OSV
media: av7110: prevent underflow in write_ts_to_decoder()2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: media: av7110: prevent underflow in write_ts_to_decoder()2025-12-30
Debian
CVE-2023-54284: linux - In the Linux kernel, the following vulnerability has been resolved: media: av71...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54284 Impact, Exploitability, and Mitigation Steps | Wiz