Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: soundwire: qcom: fix storing port config out-of-bounds The 'qcom_swrm_ctrl->pconfig' has size of QCOM_SDW_MAX_PORTS (14), however we index it starting from 1, not 0, to match real port numbers. This can lead to writing port config past 'pconfig' bounds and overwriting next member of 'qcom_swrm_ctrl' struct. Reported also by smatch: drivers/soundwire/qcom.c:1269 qcom_swrm_get_port_config() error: buffer overflow 'ctrl->pconfig' 14 <= 14
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.13, < 5.15.121 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/20f7c4d51c94abb1a1a7c21900db4fb5afe5c8ffPatch
- https://git.kernel.org/stable/c/32eb67d7360d48c15883e0d21b29c0aab9da022ePatch
- https://git.kernel.org/stable/c/490937d479abe5f6584e69b96df066bc87be92e9Patch
- https://git.kernel.org/stable/c/801daff0078087b5df9145c9f5e643c28129734bPatch
FAQ
What is CVE-2023-53465?
CVE-2023-53465 is a vulnerability with a CVSS score of 7.1 (HIGH). In the Linux kernel, the following vulnerability has been resolved: soundwire: qcom: fix storing port config out-of-bounds The 'qcom_swrm_ctrl->pconfig' has size of QCOM_SDW_MAX_PORTS (14), however ...
How severe is CVE-2023-53465?
CVE-2023-53465 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-53465?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.