In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Check writeback connectors in
create_validate_stream_for_sink [WHY & HOW] This is to check connector type
to avoid unhandled null pointer for writeback connectors.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/dbf5d3d02987faa0eec3710dd687cd912362d7b5 (6.8-rc1)
git.kernel.org/stable/c/0fe85301b95077ac4fa4a91909d38b7341e81187
git.kernel.org/stable/c/dbf5d3d02987faa0eec3710dd687cd912362d7b5
launchpad.net/bugs/cve/CVE-2023-52695
nvd.nist.gov/vuln/detail/CVE-2023-52695
security-tracker.debian.org/tracker/CVE-2023-52695
www.cve.org/CVERecord?id=CVE-2023-52695