HomeDefault status
unaffected
0057b36ac2be0f573048acda52e641e0502a9ff3 (git) before dff526dc3e27f5484f5ba11471b9fbbe681467f2
affected
0057b36ac2be0f573048acda52e641e0502a9ff3 (git) before 2c437d9a0b496168e1a1defd17b531f0a526dbe9
affected
Default status
affected
6.11
affected
Any version before 6.11
unaffected
6.12.5 (semver)
unaffected
6.13 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Adding array index check to prevent memory corruption [Why & How] Array indices out of bound caused memory corruption. Adding checks to ensure that array index stays in bound.
Product status
0057b36ac2be0f573048acda52e641e0502a9ff3 (git) before dff526dc3e27f5484f5ba11471b9fbbe681467f2
0057b36ac2be0f573048acda52e641e0502a9ff3 (git) before 2c437d9a0b496168e1a1defd17b531f0a526dbe9
6.11
Any version before 6.11
6.12.5 (semver)
6.13 (original_commit_for_fix)
References
git.kernel.org/...c/dff526dc3e27f5484f5ba11471b9fbbe681467f2
git.kernel.org/...c/2c437d9a0b496168e1a1defd17b531f0a526dbe9