U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2023-52867 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: drm/radeon: possible buffer overflow Buffer 'afmt_status' of size 6 could overflow, since index 'afmt_idx' is checked after access.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/112d4b02d94bf9fa4f1d3376587878400dd74783
https://git.kernel.org/stable/c/112d4b02d94bf9fa4f1d3376587878400dd74783
https://git.kernel.org/stable/c/19534a7a225f1bf2da70a9a90d41d0215f8f6b45
https://git.kernel.org/stable/c/19534a7a225f1bf2da70a9a90d41d0215f8f6b45
https://git.kernel.org/stable/c/341e79f8aec6af6b0061b8171d77b085835c6a58
https://git.kernel.org/stable/c/341e79f8aec6af6b0061b8171d77b085835c6a58
https://git.kernel.org/stable/c/347f025a02b3a5d715a0b471fc3b1439c338ad94
https://git.kernel.org/stable/c/347f025a02b3a5d715a0b471fc3b1439c338ad94
https://git.kernel.org/stable/c/7b063c93bece827fde237fae1c101bceeee4e896
https://git.kernel.org/stable/c/7b063c93bece827fde237fae1c101bceeee4e896
https://git.kernel.org/stable/c/caaa74541459c4c9e2c10046cf66ad2890483d0f
https://git.kernel.org/stable/c/caaa74541459c4c9e2c10046cf66ad2890483d0f
https://git.kernel.org/stable/c/d9b4fa249deaae1145d6fc2b64dae718e5c7a855
https://git.kernel.org/stable/c/d9b4fa249deaae1145d6fc2b64dae718e5c7a855
https://git.kernel.org/stable/c/dd05484f99d16715a88eedfca363828ef9a4c2d4
https://git.kernel.org/stable/c/dd05484f99d16715a88eedfca363828ef9a4c2d4
https://git.kernel.org/stable/c/ddc42881f170f1f518496f5a70447501335fc783
https://git.kernel.org/stable/c/ddc42881f170f1f518496f5a70447501335fc783

Weakness Enumeration

CWE-ID CWE Name Source

Change History

3 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2023-52867
NVD Published Date:
05/21/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org