VYPR
Unrated severityNVD Advisory· Published Dec 8, 2025· Updated Apr 15, 2026

CVE-2023-53748

CVE-2023-53748

Description

In the Linux kernel, the following vulnerability has been resolved:

media: mediatek: vcodec: Fix potential array out-of-bounds in decoder queue_setup

variable *nplanes is provided by user via system call argument. The possible value of q_data->fmt->num_planes is 1-3, while the value of *nplanes can be 1-8. The array access by index i can cause array out-of-bounds.

Fix this bug by checking *nplanes against the array size.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2023-53748: In the Linux kernel's media driver for Mediatek video codec, missing bounds check on the user-provided nplanes parameter can trigger an array out-of-bounds write in queue_setup, leading to potential memory corruption.

Vulnerability

CVE-2023-53748 is a vulnerability in the Linux kernel's Mediatek video codec driver (media: mediatek: vcodec). In the decoder's queue_setup function, the *nplanes value is supplied by a user-mode process via a system call argument. The driver uses this value to index into an array of plane format descriptors (q_data->fmt->num_planes). While the valid range of q_data->fmt->num_planes is 1 to 3, *nplanes can be set to any value between 1 and 8. When the index i iterates from 0 to *nplanes-1, it can exceed the actual array size, causing an out-of-bounds access beyond the allocated storage.

Exploitation

Exploitation requires the ability to invoke the media decoder's VIDIOC_CREATE_BUFS or similar ioctl that triggers queue_setup with a crafted *nplanes argument. The attacker must have the necessary privileges to interact with the video codec device node—typically accessible to local users with appropriate group memberships or root. No special hardware is needed beyond a Mediatek-based platform running the vulnerable kernel. The out-of-bounds access occurs in the kernel address space.

Impact

A successful out-of-bounds write can corrupt adjacent kernel memory, which may lead to a denial of service (system crash) or potentially privilege escalation if the attacker can control the written data. The exact impact depends on the memory layout and kernel hardening (KASLR, SMAP, etc.). The vulnerability is classified as a medium severity memory safety issue.

Mitigation

The fix, introduced in the Linux kernel stable updates, adds a check that verifies *nplanes does not exceed ARRAY_SIZE() of the plane array and returns an error (-EINVAL) if it does [1]. All users should apply the latest stable kernel patches containing this commit (48e4e06e2c5f or equivalent). No workaround is available; updating the kernel is the recommended remediation.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.