HomeDefault status
unaffected
3956a52bc05bd811082a3c9d2b423ee957e6fefc (git) before 2cc84c4b0d70d42e291862ecc848890d18e1004a
affected
3956a52bc05bd811082a3c9d2b423ee957e6fefc (git) before 080e8d2ecdfde588897aa8a87a8884061f4dbbbb
affected
Default status
affected
6.13
affected
Any version before 6.13
unaffected
6.15.5 (semver)
unaffected
6.16 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: LoongArch: KVM: Avoid overflow with array index The variable index is modified and reused as array index when modify register EIOINTC_ENABLE. There will be array index overflow problem.
Product status
3956a52bc05bd811082a3c9d2b423ee957e6fefc (git) before 2cc84c4b0d70d42e291862ecc848890d18e1004a
3956a52bc05bd811082a3c9d2b423ee957e6fefc (git) before 080e8d2ecdfde588897aa8a87a8884061f4dbbbb
6.13
Any version before 6.13
6.15.5 (semver)
6.16 (original_commit_for_fix)
References
git.kernel.org/...c/2cc84c4b0d70d42e291862ecc848890d18e1004a
git.kernel.org/...c/080e8d2ecdfde588897aa8a87a8884061f4dbbbb