{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-54282","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-30T12:06:44.525Z","datePublished":"2025-12-30T12:23:23.792Z","dateUpdated":"2026-05-11T19:58:57.532Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:58:57.532Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: tuners: qt1010: replace BUG_ON with a regular error\n\nBUG_ON is unnecessary here, and in addition it confuses smatch.\nReplacing this with an error return help resolve this smatch\nwarning:\n\ndrivers/media/tuners/qt1010.c:350 qt1010_init() error: buffer overflow 'i2c_data' 34 <= 34"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/media/tuners/qt1010.c"],"versions":[{"version":"4682b58e5af01ee856a706083eac71238fb69cd0","lessThan":"6cae780862d221106626b2b5fb21a197f398c6ec","status":"affected","versionType":"git"},{"version":"4682b58e5af01ee856a706083eac71238fb69cd0","lessThan":"f844bc3a47d8d1c55a4a9cfca38c538e9df7e678","status":"affected","versionType":"git"},{"version":"4682b58e5af01ee856a706083eac71238fb69cd0","lessThan":"641e60223971e95472a2a9646b1e7f94d441de45","status":"affected","versionType":"git"},{"version":"4682b58e5af01ee856a706083eac71238fb69cd0","lessThan":"2ae53dd15eef90d34fc084b5b2305a67bb675a26","status":"affected","versionType":"git"},{"version":"4682b58e5af01ee856a706083eac71238fb69cd0","lessThan":"48bb6a9fa5cb150ac2a22b3c779c96bc0ed21071","status":"affected","versionType":"git"},{"version":"4682b58e5af01ee856a706083eac71238fb69cd0","lessThan":"257092cb544c7843376b3e161f789e666ef06c98","status":"affected","versionType":"git"},{"version":"4682b58e5af01ee856a706083eac71238fb69cd0","lessThan":"1a6bf53fffe0b7ebe2a0f402b44f14f90cffd164","status":"affected","versionType":"git"},{"version":"4682b58e5af01ee856a706083eac71238fb69cd0","lessThan":"ee630b29ea44d1851bb6c903f400956604834463","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/media/tuners/qt1010.c"],"versions":[{"version":"4.2","status":"affected"},{"version":"0","lessThan":"4.2","status":"unaffected","versionType":"semver"},{"version":"4.14.326","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.295","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.257","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.197","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.133","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.55","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.5.5","lessThanOrEqual":"6.5.*","status":"unaffected","versionType":"semver"},{"version":"6.6","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"4.14.326"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"4.19.295"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"5.4.257"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"5.10.197"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"5.15.133"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"6.1.55"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"6.5.5"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"6.6"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/6cae780862d221106626b2b5fb21a197f398c6ec"},{"url":"https://git.kernel.org/stable/c/f844bc3a47d8d1c55a4a9cfca38c538e9df7e678"},{"url":"https://git.kernel.org/stable/c/641e60223971e95472a2a9646b1e7f94d441de45"},{"url":"https://git.kernel.org/stable/c/2ae53dd15eef90d34fc084b5b2305a67bb675a26"},{"url":"https://git.kernel.org/stable/c/48bb6a9fa5cb150ac2a22b3c779c96bc0ed21071"},{"url":"https://git.kernel.org/stable/c/257092cb544c7843376b3e161f789e666ef06c98"},{"url":"https://git.kernel.org/stable/c/1a6bf53fffe0b7ebe2a0f402b44f14f90cffd164"},{"url":"https://git.kernel.org/stable/c/ee630b29ea44d1851bb6c903f400956604834463"}],"title":"media: tuners: qt1010: replace BUG_ON with a regular error","x_generator":{"engine":"bippy-1.2.0"}}}}