From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7316C3E5EF0 for ; Fri, 8 May 2026 13:26:39 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778246799; cv=none; b=rmIr+mnfr8MoqIeuzTZM2H6BDfyANae2w8nm/wTNGC3JawVFrmOTjrB5koNDJgpix+0J2kE+pEkE2lPao0fAyZsuGwffVpUjlucrsFF80yUbdu9zNWF/aPAXV8FvLUoil4OgqyTHbHlIC8Wdq4c3DLsPRYh3KEkpEO1kkMYMzBI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778246799; c=relaxed/simple; bh=REeqUs1YA6Yk0+nUBYp9jMKvy3/iX4hFJUmqFyT4BZw=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=UpztbHCKiJUpi1wivafBM/HoovHmCJcu3uJnjbymEnCu+Wp789YCO2HtS0o7ev1IgsX2NiiTmM8JqIqRQRBDaJcHdG2oL+EX7Ivj3xbAmCMU+eOpjAkRCWdH6vwG9ia/HbiuQuITUzNbL3IwTY5DDtM1isV4IMuuUUlqKHv21Jc= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=HttSPkYq; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="HttSPkYq" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4417EC2BCB0; Fri, 8 May 2026 13:26:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1778246798; bh=REeqUs1YA6Yk0+nUBYp9jMKvy3/iX4hFJUmqFyT4BZw=; h=From:To:Cc:Subject:Date:Reply-To:From; b=HttSPkYqGcxdg/LcA5QmaVRMBprodV8Ur6Ty7hctBRZky1qnWPl5WKXA1yPkn1Dwi hW3Ga/lzvk/bJ7qmvdwT73wZNIEPGHaqJtXF/ovRPJ+1UBkwaH8q/nrJXZXNyVcUJp JXSss+NM4iis66peGhWJe2AUBhpHy4SWCSEq4b18= From: Greg Kroah-Hartman To: linux-cve-announce@vger.kernel.org Cc: Greg Kroah-Hartman Subject: CVE-2026-43320: drm/amd/display: Fix dsc eDP issue Date: Fri, 8 May 2026 15:26:23 +0200 Message-ID: <2026050819-CVE-2026-43320-061b@gregkh> X-Mailer: git-send-email 2.54.0 Reply-To: , Precedence: bulk X-Mailing-List: linux-cve-announce@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=1953; i=gregkh@linuxfoundation.org; h=from:subject:message-id; bh=WWohIS7gGHls3tD7NUllareZeaXsyDoTI6KcYwo0pWo=; b=owGbwMvMwCRo6H6F97bub03G02pJDJl/n1Tb3zkSdzpw9n7ZFuXDYccDuv9nhU0zlv22t/lLq IjT9PjejlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjIm60Mc8XfGdy8oXRly6Sg POFLi9fN02h7ZMow3+2DR1l2gMg1DvPqqJ6VSvzcE+Q/AAA= X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp; fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29 Content-Transfer-Encoding: 8bit From: Greg Kroah-Hartman Description =========== In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix dsc eDP issue [why] Need to add function hook check before use The Linux kernel CVE team has assigned CVE-2026-43320 to this issue. Affected and fixed versions =========================== Fixed in 6.12.75 with commit 11718976c53a258c4d107aa05d68773379d0006f Fixed in 6.18.16 with commit c10fe9471f3aa352bb9d9329d0b25e28e0672243 Fixed in 6.19.6 with commit 0481be9f12d8324789ccebf1e5fd0704b6e3fc99 Fixed in 7.0 with commit 878a4b73c11111ff5f820730f59a7f8c6fd59374 Please see https://www.kernel.org for a full list of currently supported kernel versions by the kernel community. Unaffected versions might change over time as fixes are backported to older supported kernel versions. The official CVE entry at https://cve.org/CVERecord/?id=CVE-2026-43320 will be updated if fixes are backported, please check that for the most up to date information about this issue. Affected files ============== The file(s) affected by this issue are: drivers/gpu/drm/amd/display/dc/hwss/dce110/dce110_hwseq.c Mitigation ========== The Linux kernel CVE team recommends that you update to the latest stable kernel version for this, and many other bugfixes. Individual changes are never tested alone, but rather are part of a larger kernel release. Cherry-picking individual commits is not recommended or supported by the Linux kernel community at all. If however, updating to the latest release is impossible, the individual changes to resolve this issue can be found at these commits: https://git.kernel.org/stable/c/11718976c53a258c4d107aa05d68773379d0006f https://git.kernel.org/stable/c/c10fe9471f3aa352bb9d9329d0b25e28e0672243 https://git.kernel.org/stable/c/0481be9f12d8324789ccebf1e5fd0704b6e3fc99 https://git.kernel.org/stable/c/878a4b73c11111ff5f820730f59a7f8c6fd59374