CVE-2023-52819

In the Linux kernel, the following vulnerability has been resolved: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga For pptable structs that use flexible array sizes, use flexible arrays.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

02 Apr 2025, 15:00

Type Values Removed Values Added
CWE CWE-129
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0f0e59075b5c22f1e871fbd508d6e4f495048356 - () https://git.kernel.org/stable/c/0f0e59075b5c22f1e871fbd508d6e4f495048356 - Patch
References () https://git.kernel.org/stable/c/60a00dfc7c5deafd1dd393beaf53224f7256dad6 - () https://git.kernel.org/stable/c/60a00dfc7c5deafd1dd393beaf53224f7256dad6 - Patch
References () https://git.kernel.org/stable/c/7c68283f3166221af3df5791f0e13d3137a72216 - () https://git.kernel.org/stable/c/7c68283f3166221af3df5791f0e13d3137a72216 - Patch
References () https://git.kernel.org/stable/c/8c1dbddbfcb051e82cea0c197c620f9dcdc38e92 - () https://git.kernel.org/stable/c/8c1dbddbfcb051e82cea0c197c620f9dcdc38e92 - Patch
References () https://git.kernel.org/stable/c/a237675aa1e62bbfaa341c535331c8656a508fa1 - () https://git.kernel.org/stable/c/a237675aa1e62bbfaa341c535331c8656a508fa1 - Patch
References () https://git.kernel.org/stable/c/a63fd579e7b1c3a9ebd6e6c494d49b1b6cf5515e - () https://git.kernel.org/stable/c/a63fd579e7b1c3a9ebd6e6c494d49b1b6cf5515e - Patch
References () https://git.kernel.org/stable/c/b3b8b7c040cf069da7afe11c5bd73b870b8f3d18 - () https://git.kernel.org/stable/c/b3b8b7c040cf069da7afe11c5bd73b870b8f3d18 - Patch
References () https://git.kernel.org/stable/c/d0725232da777840703f5f1e22f2e3081d712aa4 - () https://git.kernel.org/stable/c/d0725232da777840703f5f1e22f2e3081d712aa4 - Patch
References () https://git.kernel.org/stable/c/d50a56749e5afdc63491b88f5153c1aae00d4679 - () https://git.kernel.org/stable/c/d50a56749e5afdc63491b88f5153c1aae00d4679 - Patch

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0f0e59075b5c22f1e871fbd508d6e4f495048356 - () https://git.kernel.org/stable/c/0f0e59075b5c22f1e871fbd508d6e4f495048356 -
References () https://git.kernel.org/stable/c/60a00dfc7c5deafd1dd393beaf53224f7256dad6 - () https://git.kernel.org/stable/c/60a00dfc7c5deafd1dd393beaf53224f7256dad6 -
References () https://git.kernel.org/stable/c/7c68283f3166221af3df5791f0e13d3137a72216 - () https://git.kernel.org/stable/c/7c68283f3166221af3df5791f0e13d3137a72216 -
References () https://git.kernel.org/stable/c/8c1dbddbfcb051e82cea0c197c620f9dcdc38e92 - () https://git.kernel.org/stable/c/8c1dbddbfcb051e82cea0c197c620f9dcdc38e92 -
References () https://git.kernel.org/stable/c/a237675aa1e62bbfaa341c535331c8656a508fa1 - () https://git.kernel.org/stable/c/a237675aa1e62bbfaa341c535331c8656a508fa1 -
References () https://git.kernel.org/stable/c/a63fd579e7b1c3a9ebd6e6c494d49b1b6cf5515e - () https://git.kernel.org/stable/c/a63fd579e7b1c3a9ebd6e6c494d49b1b6cf5515e -
References () https://git.kernel.org/stable/c/b3b8b7c040cf069da7afe11c5bd73b870b8f3d18 - () https://git.kernel.org/stable/c/b3b8b7c040cf069da7afe11c5bd73b870b8f3d18 -
References () https://git.kernel.org/stable/c/d0725232da777840703f5f1e22f2e3081d712aa4 - () https://git.kernel.org/stable/c/d0725232da777840703f5f1e22f2e3081d712aa4 -
References () https://git.kernel.org/stable/c/d50a56749e5afdc63491b88f5153c1aae00d4679 - () https://git.kernel.org/stable/c/d50a56749e5afdc63491b88f5153c1aae00d4679 -

05 Nov 2024, 19:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.6
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: drm/amd: corrige el índice de matriz UBSAN fuera de límites para Polaris y Tonga. Para estructuras pptable que usan tamaños de matriz flexibles, use matrices flexibles.

21 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 16:15

Updated : 2025-04-02 15:00


NVD link : CVE-2023-52819

Mitre link : CVE-2023-52819

CVE.ORG link : CVE-2023-52819


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-129

Improper Validation of Array Index