In the Linux kernel, the following vulnerability has been resolved:
drm/mediatek: Fix coverity issue with unintentional integer overflow 1.
Instead of multiplying 2 variable of different types. Change to assign a
value of one variable and then multiply the other variable. 2. Add a int
variable for multiplier calculation instead of calculating different types
multiplier with dma_addr_t variable directly.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/b0b0d811eac6b4c52cb9ad632fa6384cf48869e7 (6.7-rc1)
git.kernel.org/stable/c/0d8a1df39d3fc34560e2cc663b5c340d06a25396
git.kernel.org/stable/c/96312a251d4dcee5d36e32edba3002bfde0ddd9c
git.kernel.org/stable/c/b0b0d811eac6b4c52cb9ad632fa6384cf48869e7
launchpad.net/bugs/cve/CVE-2023-52857
nvd.nist.gov/vuln/detail/CVE-2023-52857
security-tracker.debian.org/tracker/CVE-2023-52857
www.cve.org/CVERecord?id=CVE-2023-52857