Skip to main content

CVE-2023-52916: Vulnerability in Linux Linux

High
VulnerabilityCVE-2023-52916cvecve-2023-52916
Published: Fri Sep 06 2024 (09/06/2024, 09:07:50 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: media: aspeed: Fix memory overwrite if timing is 1600x900 When capturing 1600x900, system could crash when system memory usage is tight. The way to reproduce this issue: 1. Use 1600x900 to display on host 2. Mount ISO through 'Virtual media' on OpenBMC's web 3. Run script as below on host to do sha continuously #!/bin/bash while [ [1] ]; do find /media -type f -printf '"%h/%f"\n' | xargs sha256sum done 4. Open KVM on OpenBMC's web The size of macro block captured is 8x8. Therefore, we should make sure the height of src-buf is 8 aligned to fix this issue.

AI-Powered Analysis

AILast updated: 07/01/2025, 08:40:08 UTC

Technical Analysis

CVE-2023-52916 is a vulnerability identified in the Linux kernel specifically related to the media subsystem for the ASPEED graphics driver, which is commonly used in server management controllers such as OpenBMC. The issue arises when the system is configured to display at a resolution of 1600x900 pixels. Under conditions of high memory pressure, the kernel may experience a memory overwrite leading to a system crash. The root cause is related to the handling of macro blocks during video capture; the macro block size is 8x8 pixels, but the height of the source buffer was not properly aligned to this 8-pixel boundary. This misalignment can cause buffer overruns when capturing video frames at 1600x900 resolution. The vulnerability can be reproduced by mounting an ISO image via OpenBMC's virtual media interface, running a continuous SHA256 checksum script on the mounted media, and opening a KVM session through OpenBMC's web interface. This sequence stresses the media capture path and triggers the memory overwrite. The flaw has been fixed by ensuring the source buffer height is aligned to the 8-pixel macro block size, preventing the overwrite and subsequent crash. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, especially those operating data centers or critical infrastructure that use OpenBMC or similar server management solutions with ASPEED graphics hardware, this vulnerability poses a risk of denial-of-service (DoS) through system crashes. The memory overwrite can cause kernel panics, leading to unplanned downtime of servers or network equipment. This can disrupt business operations, affect service availability, and potentially impact data integrity if systems crash during critical operations. Since OpenBMC is widely used in enterprise-grade servers and cloud infrastructure, organizations relying on these platforms could face operational instability. Although there is no indication of remote code execution or privilege escalation, the DoS impact on availability is significant, particularly in environments with high memory utilization or where virtual media and KVM features are heavily used for remote management. The vulnerability may also complicate incident response or maintenance activities that involve remote media mounting or KVM sessions.

Mitigation Recommendations

European organizations should promptly apply the Linux kernel patches that address this vulnerability once available from their Linux distribution vendors or directly from the Linux kernel source. Until patches are deployed, organizations should consider the following mitigations: 1) Avoid using the 1600x900 resolution setting on systems using ASPEED graphics with OpenBMC or similar management controllers. 2) Limit or disable the use of virtual media mounting and KVM features on OpenBMC interfaces, especially in environments with tight memory constraints. 3) Monitor system logs and kernel messages for signs of memory corruption or crashes related to media capture. 4) Implement strict access controls on OpenBMC web interfaces to prevent unauthorized triggering of the vulnerable code path. 5) Conduct thorough testing of remote management workflows to identify any instability. These targeted mitigations reduce the risk of triggering the vulnerability while patches are being rolled out.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-08-21T06:07:11.017Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9831c4522896dcbe78f9

Added to database: 5/21/2025, 9:09:05 AM

Last enriched: 7/1/2025, 8:40:08 AM

Last updated: 8/14/2025, 4:38:52 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats