lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025123052-CVE-2023-54245-fc10@gregkh>
Date: Tue, 30 Dec 2025 13:20:11 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2023-54245: ASoC: codecs: tx-macro: Fix for KASAN: slab-out-of-bounds

From: Greg Kroah-Hartman <gregkh@...nel.org>

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

ASoC: codecs: tx-macro: Fix for KASAN: slab-out-of-bounds

When we run syzkaller we get below Out of Bound.
    "KASAN: slab-out-of-bounds Read in regcache_flat_read"

    Below is the backtrace of the issue:

    dump_backtrace+0x0/0x4c8
    show_stack+0x34/0x44
    dump_stack_lvl+0xd8/0x118
    print_address_description+0x30/0x2d8
    kasan_report+0x158/0x198
    __asan_report_load4_noabort+0x44/0x50
    regcache_flat_read+0x10c/0x110
    regcache_read+0xf4/0x180
    _regmap_read+0xc4/0x278
    _regmap_update_bits+0x130/0x290
    regmap_update_bits_base+0xc0/0x15c
    snd_soc_component_update_bits+0xa8/0x22c
    snd_soc_component_write_field+0x68/0xd4
    tx_macro_digital_mute+0xec/0x140

    Actually There is no need to have decimator with 32 bits.
    By limiting the variable with short type u8 issue is resolved.

The Linux kernel CVE team has assigned CVE-2023-54245 to this issue.


Affected and fixed versions
===========================

	Fixed in 5.15.106 with commit da35a4e6eee5d73886312e85322a6e97df901987
	Fixed in 6.1.23 with commit 57f9a9a232bde7abfe49c3072b29a255da9ba891
	Fixed in 6.2.10 with commit b0cd740a31412340fead50e69e4fe9bc3781c754
	Fixed in 6.3 with commit e5e7e398f6bb7918dab0612eb6991f7bae95520d

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2023-54245
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	sound/soc/codecs/lpass-tx-macro.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/da35a4e6eee5d73886312e85322a6e97df901987
	https://git.kernel.org/stable/c/57f9a9a232bde7abfe49c3072b29a255da9ba891
	https://git.kernel.org/stable/c/b0cd740a31412340fead50e69e4fe9bc3781c754
	https://git.kernel.org/stable/c/e5e7e398f6bb7918dab0612eb6991f7bae95520d

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ