ghsa-xmph-r8h2-5h79
Vulnerability from github
Published
2024-05-21 18:31
Modified
2024-05-21 18:31
Details
In the Linux kernel, the following vulnerability has been resolved:
drm/radeon: possible buffer overflow
Buffer 'afmt_status' of size 6 could overflow, since index 'afmt_idx' is checked after access.
{ "affected": [], "aliases": [ "CVE-2023-52867" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-05-21T16:15:23Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: possible buffer overflow\n\nBuffer \u0027afmt_status\u0027 of size 6 could overflow, since index \u0027afmt_idx\u0027 is\nchecked after access.", "id": "GHSA-xmph-r8h2-5h79", "modified": "2024-05-21T18:31:23Z", "published": "2024-05-21T18:31:23Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52867" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/112d4b02d94bf9fa4f1d3376587878400dd74783" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/19534a7a225f1bf2da70a9a90d41d0215f8f6b45" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/341e79f8aec6af6b0061b8171d77b085835c6a58" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/347f025a02b3a5d715a0b471fc3b1439c338ad94" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/7b063c93bece827fde237fae1c101bceeee4e896" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/caaa74541459c4c9e2c10046cf66ad2890483d0f" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/d9b4fa249deaae1145d6fc2b64dae718e5c7a855" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/dd05484f99d16715a88eedfca363828ef9a4c2d4" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/ddc42881f170f1f518496f5a70447501335fc783" } ], "schema_version": "1.4.0", "severity": [] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.