CVE-2023-52867

In the Linux kernel, the following vulnerability has been resolved: drm/radeon: possible buffer overflow Buffer 'afmt_status' of size 6 could overflow, since index 'afmt_idx' is checked after access.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

24 Sep 2025, 00:47

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-787
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/112d4b02d94bf9fa4f1d3376587878400dd74783 - () https://git.kernel.org/stable/c/112d4b02d94bf9fa4f1d3376587878400dd74783 - Patch
References () https://git.kernel.org/stable/c/19534a7a225f1bf2da70a9a90d41d0215f8f6b45 - () https://git.kernel.org/stable/c/19534a7a225f1bf2da70a9a90d41d0215f8f6b45 - Patch
References () https://git.kernel.org/stable/c/341e79f8aec6af6b0061b8171d77b085835c6a58 - () https://git.kernel.org/stable/c/341e79f8aec6af6b0061b8171d77b085835c6a58 - Patch
References () https://git.kernel.org/stable/c/347f025a02b3a5d715a0b471fc3b1439c338ad94 - () https://git.kernel.org/stable/c/347f025a02b3a5d715a0b471fc3b1439c338ad94 - Patch
References () https://git.kernel.org/stable/c/7b063c93bece827fde237fae1c101bceeee4e896 - () https://git.kernel.org/stable/c/7b063c93bece827fde237fae1c101bceeee4e896 - Patch
References () https://git.kernel.org/stable/c/caaa74541459c4c9e2c10046cf66ad2890483d0f - () https://git.kernel.org/stable/c/caaa74541459c4c9e2c10046cf66ad2890483d0f - Patch
References () https://git.kernel.org/stable/c/d9b4fa249deaae1145d6fc2b64dae718e5c7a855 - () https://git.kernel.org/stable/c/d9b4fa249deaae1145d6fc2b64dae718e5c7a855 - Patch
References () https://git.kernel.org/stable/c/dd05484f99d16715a88eedfca363828ef9a4c2d4 - () https://git.kernel.org/stable/c/dd05484f99d16715a88eedfca363828ef9a4c2d4 - Patch
References () https://git.kernel.org/stable/c/ddc42881f170f1f518496f5a70447501335fc783 - () https://git.kernel.org/stable/c/ddc42881f170f1f518496f5a70447501335fc783 - Patch

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/112d4b02d94bf9fa4f1d3376587878400dd74783 - () https://git.kernel.org/stable/c/112d4b02d94bf9fa4f1d3376587878400dd74783 -
References () https://git.kernel.org/stable/c/19534a7a225f1bf2da70a9a90d41d0215f8f6b45 - () https://git.kernel.org/stable/c/19534a7a225f1bf2da70a9a90d41d0215f8f6b45 -
References () https://git.kernel.org/stable/c/341e79f8aec6af6b0061b8171d77b085835c6a58 - () https://git.kernel.org/stable/c/341e79f8aec6af6b0061b8171d77b085835c6a58 -
References () https://git.kernel.org/stable/c/347f025a02b3a5d715a0b471fc3b1439c338ad94 - () https://git.kernel.org/stable/c/347f025a02b3a5d715a0b471fc3b1439c338ad94 -
References () https://git.kernel.org/stable/c/7b063c93bece827fde237fae1c101bceeee4e896 - () https://git.kernel.org/stable/c/7b063c93bece827fde237fae1c101bceeee4e896 -
References () https://git.kernel.org/stable/c/caaa74541459c4c9e2c10046cf66ad2890483d0f - () https://git.kernel.org/stable/c/caaa74541459c4c9e2c10046cf66ad2890483d0f -
References () https://git.kernel.org/stable/c/d9b4fa249deaae1145d6fc2b64dae718e5c7a855 - () https://git.kernel.org/stable/c/d9b4fa249deaae1145d6fc2b64dae718e5c7a855 -
References () https://git.kernel.org/stable/c/dd05484f99d16715a88eedfca363828ef9a4c2d4 - () https://git.kernel.org/stable/c/dd05484f99d16715a88eedfca363828ef9a4c2d4 -
References () https://git.kernel.org/stable/c/ddc42881f170f1f518496f5a70447501335fc783 - () https://git.kernel.org/stable/c/ddc42881f170f1f518496f5a70447501335fc783 -
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: drm/radeon: posible desbordamiento del búfer. El búfer 'afmt_status' de tamaño 6 podría desbordarse, ya que el índice 'afmt_idx' se comprueba después del acceso.

21 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 16:15

Updated : 2025-09-24 00:47


NVD link : CVE-2023-52867

Mitre link : CVE-2023-52867

CVE.ORG link : CVE-2023-52867


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write