// For flags

CVE-2023-54284

media: av7110: prevent underflow in write_ts_to_decoder()

Severity Score

"-"
*CVSS v-

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In the Linux kernel, the following vulnerability has been resolved: media: av7110: prevent underflow in write_ts_to_decoder() The buf[4] value comes from the user via ts_play(). It is a value in
the u8 range. The final length we pass to av7110_ipack_instant_repack()
is "len - (buf[4] + 1) - 4" so add a check to ensure that the length is
not negative. It's not clear that passing a negative len value does
anything bad necessarily, but it's not best practice. With the new bounds checking the "if (!len)" condition is no longer
possible or required so remove that.

*Credits: N/A
CVSS Scores
Attack Vector
-
Attack Complexity
-
Privileges Required
-
User Interaction
-
Scope
-
Confidentiality
-
Integrity
-
Availability
-
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2025-12-30 CVE Reserved
  • 2025-12-30 CVE Published
  • 2025-12-31 CVE Updated
  • 2025-12-31 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 2.6.31 < 4.14.315
Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.31 < 4.14.315"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 2.6.31 < 4.19.283
Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.31 < 4.19.283"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 2.6.31 < 5.4.243
Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.31 < 5.4.243"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 2.6.31 < 5.10.211
Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.31 < 5.10.211"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 2.6.31 < 5.15.111
Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.31 < 5.15.111"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 2.6.31 < 6.1.28
Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.31 < 6.1.28"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 2.6.31 < 6.2.15
Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.31 < 6.2.15"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 2.6.31 < 6.3.2
Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.31 < 6.3.2"
en
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 2.6.31 < 6.4
Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.31 < 6.4"
en
Affected