Home
HIGH: 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:HDefault status
unaffected
aac243092b707bb3018e951d470cc1a9bcbaba6c (git) before 3464e751755172ddbb849c1bd92f5f59e95c59a1
affected
aac243092b707bb3018e951d470cc1a9bcbaba6c (git) before 3ed2ae6b3fe869f99b75afd02045ba5c0c0773e2
affected
aac243092b707bb3018e951d470cc1a9bcbaba6c (git) before 901ec3470994006bc8dd02399e16b675566c3416
affected
Default status
affected
6.14
affected
Any version before 6.14
unaffected
6.18.17 (semver)
unaffected
6.19.7 (semver)
unaffected
7.0 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Validate command buffer payload count The count field in the command header is used to determine the valid payload size. Verify that the valid payload does not exceed the remaining buffer space.
Product status
aac243092b707bb3018e951d470cc1a9bcbaba6c (git) before 3464e751755172ddbb849c1bd92f5f59e95c59a1
aac243092b707bb3018e951d470cc1a9bcbaba6c (git) before 3ed2ae6b3fe869f99b75afd02045ba5c0c0773e2
aac243092b707bb3018e951d470cc1a9bcbaba6c (git) before 901ec3470994006bc8dd02399e16b675566c3416
6.14
Any version before 6.14
6.18.17 (semver)
6.19.7 (semver)
7.0 (original_commit_for_fix)
References
git.kernel.org/...c/3464e751755172ddbb849c1bd92f5f59e95c59a1
git.kernel.org/...c/3ed2ae6b3fe869f99b75afd02045ba5c0c0773e2
git.kernel.org/...c/901ec3470994006bc8dd02399e16b675566c3416