Page 100 of 4317 results (0.007 seconds)

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] [WHY & HOW] num_valid_sets needs to be checked to avoid a negative index when accessing reader_wm_sets[num_valid_sets - 1]. This fixes an OVERRUN issue reported by Coverity. • https://git.kernel.org/stable/c/a72d4996409569027b4609414a14a87679b12267 https://git.kernel.org/stable/c/7c47dd2e92341f2989ab73dbed07f8894593ad7b https://git.kernel.org/stable/c/c4a7f7c0062fe2c73f70bb7e335199e25bd71492 https://git.kernel.org/stable/c/b36e9b3104c4ba0f2f5dd083dcf6159cb316c996 https://git.kernel.org/stable/c/21f9cb44f8c60bf6c26487d428b1a09ad3e8aebf https://git.kernel.org/stable/c/6a4a08e45e614cfa7a56498cdfaeb7fae2f07fa0 https://git.kernel.org/stable/c/b38a4815f79b87efb196cd5121579fc51e29a7fb •

CVSS: -EPSS: 0%CPEs: 6EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check msg_id before processing transcation [WHY & HOW] HDCP_MESSAGE_ID_INVALID (-1) is not a valid msg_id nor is it a valid array index, and it needs checking before used. This fixes 4 OVERRUN issues reported by Coverity. • https://git.kernel.org/stable/c/916083054670060023d3f8a8ace895d710e268f4 https://git.kernel.org/stable/c/fe63daf7b10253b0faaa60c55d6153cd276927aa https://git.kernel.org/stable/c/0147505f08220c89b3a9c90eb608191276e263a8 https://git.kernel.org/stable/c/cb63090a17d3abb87f132851fa3711281249b7d2 https://git.kernel.org/stable/c/6590643c5de74098d27933b7d224d5ac065d7755 https://git.kernel.org/stable/c/fa71face755e27dc44bc296416ebdf2c67163316 •

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check link_index before accessing dc->links[] [WHY & HOW] dc->links[] has max size of MAX_LINKS and NULL is return when trying to access with out-of-bound index. This fixes 3 OVERRUN and 1 RESOURCE_LEAK issues reported by Coverity. • https://git.kernel.org/stable/c/ac04759b4a002969cf0f1384f1b8bb2001cfa782 https://git.kernel.org/stable/c/8aa2864044b9d13e95fe224f32e808afbf79ecdf •

CVSS: -EPSS: 0%CPEs: 4EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration [Why] Coverity reports Memory - illegal accesses. [How] Skip inactive planes. • https://git.kernel.org/stable/c/3300a039caf850376bc3416c808cd8879da412bb https://git.kernel.org/stable/c/8406158a546441b73f0b216aedacbf9a1e5748fb https://git.kernel.org/stable/c/ee9d6df6d9172917d9ddbd948bb882652d5ecd29 https://git.kernel.org/stable/c/a54f7e866cc73a4cb71b8b24bb568ba35c8969df •

CVSS: -EPSS: 0%CPEs: 3EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box [Why] Coverity reports OVERRUN warning. soc.num_states could be 40. But array range of bw_params->clk_table.entries is 8. [How] Assert if soc.num_states greater than 8. • https://git.kernel.org/stable/c/4003bac784380fed1f94f197350567eaa73a409d https://git.kernel.org/stable/c/aba188d6f4ebaf52acf13f204db2bd2c22072504 https://git.kernel.org/stable/c/188fd1616ec43033cedbe343b6579e9921e2d898 •