HomeDefectsLIN1022-19767
Fixed

LIN1022-19767 : Security Advisory - linux - CVE-2023-53788

Created: Dec 9, 2025    Updated: Dec 11, 2025
Resolved Date: Dec 10, 2025
Found In Version: 10.22.33.1
Fix Version: 10.22.33.8
Severity: Standard
Applicable for: Wind River Linux LTS 22
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved: ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set() tuning_ctl_set() might have buffer overrun at (X) if it didn't break from loop by matching (A). \tstatic int tuning_ctl_set(...) \t{ \t\tfor (i = 0; i < TUNING_CTLS_COUNT; i++) (A)\t\t\tif (nid == ca0132_tuning_ctls[i].nid) \t\t\t\tbreak; \t\tsnd_hda_power_up(...); (X)\t\tdspio_set_param(..., ca0132_tuning_ctls[i].mid, ...); \t\tsnd_hda_power_down(...);        ^ \t\treturn 1; \t} We will get below error by cppcheck \tsound/pci/hda/patch_ca0132.c:4229:2: note: After for loop, i has value 12 \t for (i = 0; i < TUNING_CTLS_COUNT; i++) \t ^ \tsound/pci/hda/patch_ca0132.c:4234:43: note: Array index out of bounds \t dspio_set_param(codec, ca0132_tuning_ctls[i].mid, 0x20, \t                      ^ This patch cares non match case.

CVEs


Live chat
Online