Metrics
Affected Vendors & Products
Sat, 14 Dec 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 28 Oct 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Sun, 29 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 06 Sep 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 06 Sep 2024 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: media: aspeed: Fix memory overwrite if timing is 1600x900 When capturing 1600x900, system could crash when system memory usage is tight. The way to reproduce this issue: 1. Use 1600x900 to display on host 2. Mount ISO through 'Virtual media' on OpenBMC's web 3. Run script as below on host to do sha continuously #!/bin/bash while [ [1] ]; do find /media -type f -printf '"%h/%f"\n' | xargs sha256sum done 4. Open KVM on OpenBMC's web The size of macro block captured is 8x8. Therefore, we should make sure the height of src-buf is 8 aligned to fix this issue. | |
Title | media: aspeed: Fix memory overwrite if timing is 1600x900 | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2024-09-06T09:07:50.462Z
Updated: 2024-12-19T08:28:30.223Z
Reserved: 2024-08-21T06:07:11.017Z
Link: CVE-2023-52916

Updated: 2024-09-09T20:46:40.252Z

Status : Awaiting Analysis
Published: 2024-09-06T09:15:03.327
Modified: 2024-12-14T21:15:16.370
Link: CVE-2023-52916
