CVE-2023-54282
Unknown Unknown - Not Provided
Buffer Overflow in Linux Kernel qt1010 Tuner Driver

Publication date: 2025-12-30

Last updated on: 2025-12-30

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: media: tuners: qt1010: replace BUG_ON with a regular error BUG_ON is unnecessary here, and in addition it confuses smatch. Replacing this with an error return help resolve this smatch warning: drivers/media/tuners/qt1010.c:350 qt1010_init() error: buffer overflow 'i2c_data' 34 <= 34
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-30
Last Modified
2025-12-30
Generated
2026-05-07
AI Q&A
2025-12-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
linux kernel *
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves the Linux kernel's media tuner driver for qt1010, where a BUG_ON macro was used unnecessarily. BUG_ON can cause confusion in static analysis tools like smatch and may lead to improper handling of errors. The issue was related to a potential buffer overflow in the i2c_data buffer during qt1010 initialization. The fix replaced BUG_ON with a regular error return to prevent this problem.


How can this vulnerability impact me? :

The vulnerability could lead to a buffer overflow in the qt1010 tuner driver within the Linux kernel, which might cause system instability or crashes. It could also potentially be exploited to cause denial of service or other unintended behavior in systems using this driver.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart