In the Linux kernel, the following vulnerability has been resolved:
drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga
For pptable structs that use flexible array sizes, use flexible arrays.
References
Configurations
Configuration 1 (hide)
|
History
02 Apr 2025, 15:00
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/0f0e59075b5c22f1e871fbd508d6e4f495048356 - Patch | |
References | () https://git.kernel.org/stable/c/60a00dfc7c5deafd1dd393beaf53224f7256dad6 - Patch | |
References | () https://git.kernel.org/stable/c/7c68283f3166221af3df5791f0e13d3137a72216 - Patch | |
References | () https://git.kernel.org/stable/c/8c1dbddbfcb051e82cea0c197c620f9dcdc38e92 - Patch | |
References | () https://git.kernel.org/stable/c/a237675aa1e62bbfaa341c535331c8656a508fa1 - Patch | |
References | () https://git.kernel.org/stable/c/a63fd579e7b1c3a9ebd6e6c494d49b1b6cf5515e - Patch | |
References | () https://git.kernel.org/stable/c/b3b8b7c040cf069da7afe11c5bd73b870b8f3d18 - Patch | |
References | () https://git.kernel.org/stable/c/d0725232da777840703f5f1e22f2e3081d712aa4 - Patch | |
References | () https://git.kernel.org/stable/c/d50a56749e5afdc63491b88f5153c1aae00d4679 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CWE | CWE-129 |
Information
Published : 2024-05-21 16:15
Updated : 2025-04-02 15:00
NVD link : CVE-2023-52819
Mitre link : CVE-2023-52819
CVE.ORG link : CVE-2023-52819
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index