Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 For pptable structs that use flexible array sizes, use flexible arrays.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 4.14.331 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/6dffdddfca818c02a42b6caa1d9845995f0a1f94Patch
- https://git.kernel.org/stable/c/760efbca74a405dc439a013a5efaa9fadc95a8c3Patch
- https://git.kernel.org/stable/c/8af28ae3acb736ada4ce3457662fa446cc913bb4Patch
- https://git.kernel.org/stable/c/92a775e7c9707aed28782bafe636bf87675f5a97Patch
- https://git.kernel.org/stable/c/acdb6830de02cf2873aeaccdf2d9bca4aee50e47Patch
- https://git.kernel.org/stable/c/c847379a5d00078ad6fcb1c24230e72c5609342fPatch
- https://git.kernel.org/stable/c/cfd8cd907fd94538561479a43aea455f5cf16928Patch
- https://git.kernel.org/stable/c/e52e324a21341c97350d5f11de14721c1c609498Patch
- https://git.kernel.org/stable/c/fc9ac0e8e0bcb3740c6eaad3a1a50c20016d422bPatch
- https://git.kernel.org/stable/c/6dffdddfca818c02a42b6caa1d9845995f0a1f94Patch
- https://git.kernel.org/stable/c/760efbca74a405dc439a013a5efaa9fadc95a8c3Patch
- https://git.kernel.org/stable/c/8af28ae3acb736ada4ce3457662fa446cc913bb4Patch
- https://git.kernel.org/stable/c/92a775e7c9707aed28782bafe636bf87675f5a97Patch
- https://git.kernel.org/stable/c/acdb6830de02cf2873aeaccdf2d9bca4aee50e47Patch
- https://git.kernel.org/stable/c/c847379a5d00078ad6fcb1c24230e72c5609342fPatch
FAQ
What is CVE-2023-52818?
CVE-2023-52818 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 For pptable structs that use flexible array sizes, use flexible arrays.
How severe is CVE-2023-52818?
CVE-2023-52818 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-52818?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.