In the Linux kernel, the following vulnerability has been resolved:
ALSA: hda/via: Avoid potential array out-of-bound in add_secret_dac_path()
snd_hda_get_connections() can return a negative error code.
It may lead to accessing 'conn' array at a negative index.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
References
Configurations
Configuration 1 (hide)
|
History
15 Apr 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-129 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
Summary |
|
|
References | () https://git.kernel.org/stable/c/1b9256c96220bcdba287eeeb90e7c910c77f8c46 - Patch | |
References | () https://git.kernel.org/stable/c/2b557fa635e7487f638c0f030c305870839eeda2 - Patch | |
References | () https://git.kernel.org/stable/c/437e50ef6290ac835d526d0e45f466a0aa69ba1b - Patch | |
References | () https://git.kernel.org/stable/c/6e1f586ddec48d71016b81acf68ba9f49ca54db8 - Patch | |
References | () https://git.kernel.org/stable/c/b9cee506da2b7920b5ea02ccd8e78a907d0ee7aa - Patch | |
References | () https://git.kernel.org/stable/c/d6870f3800dbb212ae8433183ee82f566d067c6c - Patch | |
References | () https://git.kernel.org/stable/c/f011360ad234a07cb6fbcc720fff646a93a9f0d6 - Patch |
27 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-27 17:15
Updated : 2025-04-15 14:15
NVD link : CVE-2023-52988
Mitre link : CVE-2023-52988
CVE.ORG link : CVE-2023-52988
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index