Improper Validation of Array Index Affecting kernel-headers package, versions *


Severity

Recommended
high

Based on CentOS security rating.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS7-KERNELHEADERS-14346861
  • published10 Dec 2025
  • disclosed9 Dec 2025

Introduced: 9 Dec 2025

NewCVE-2023-53788  (opens in a new tab)
CWE-129  (opens in a new tab)

How to fix?

There is no fixed version for Centos:7 kernel-headers.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-headers package and not the kernel-headers package as distributed by Centos. See How to fix? for Centos:7 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set()

tuning_ctl_set() might have buffer overrun at (X) if it didn't break from loop by matching (A).

static int tuning_ctl_set(...)
{
    for (i = 0; i < TUNING_CTLS_COUNT; i++)

(A) if (nid == ca0132_tuning_ctls[i].nid) break;

    snd_hda_power_up(...);

(X) dspio_set_param(..., ca0132_tuning_ctls[i].mid, ...); snd_hda_power_down(...); ^

    return 1;
}

We will get below error by cppcheck

sound/pci/hda/patch_ca0132.c:4229:2: note: After for loop, i has value 12
 for (i = 0; i < TUNING_CTLS_COUNT; i++)
 ^
sound/pci/hda/patch_ca0132.c:4234:43: note: Array index out of bounds
 dspio_set_param(codec, ca0132_tuning_ctls[i].mid, 0x20,
                                           ^

This patch cares non match case.

CVSS Base Scores

version 3.1