Page 45 of 3802 results (0.006 seconds)

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 [Why] Coverity reports OVERRUN warning. Should abort amdgpu_dm initialize. [How] Return failure to amdgpu_dm_init. • https://git.kernel.org/stable/c/d619b91d3c4af60ac422f1763ce53d721fb91262 https://git.kernel.org/stable/c/754321ed63f0a4a31252ca72e0bd89a9e1888018 https://git.kernel.org/stable/c/21bbb39863f10f5fb4bf772d15b07d5d13590e9d https://git.kernel.org/stable/c/28b515c458aa9c92bfcb99884c94713a5f471cea https://git.kernel.org/stable/c/94cb77700fa4ae6200486bfa0ba2ac547534afd2 https://git.kernel.org/stable/c/d398c74c881dee695f6eb6138c9891644e1c3d9d https://git.kernel.org/stable/c/84723eb6068c50610c5c0893980d230d7afa2105 •

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links [Why] Coverity report OVERRUN warning. There are only max_links elements within dc->links. link count could up to AMDGPU_DM_MAX_DISPLAY_INDEX 31. [How] Make sure link count less than max_links. • https://git.kernel.org/stable/c/36c39a8dcce210649f2f45f252abaa09fcc1ae87 https://git.kernel.org/stable/c/cf8b16857db702ceb8d52f9219a4613363e2b1cf •

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] [WHY & HOW] num_valid_sets needs to be checked to avoid a negative index when accessing reader_wm_sets[num_valid_sets - 1]. This fixes an OVERRUN issue reported by Coverity. • https://git.kernel.org/stable/c/a72d4996409569027b4609414a14a87679b12267 https://git.kernel.org/stable/c/7c47dd2e92341f2989ab73dbed07f8894593ad7b https://git.kernel.org/stable/c/c4a7f7c0062fe2c73f70bb7e335199e25bd71492 https://git.kernel.org/stable/c/b36e9b3104c4ba0f2f5dd083dcf6159cb316c996 https://git.kernel.org/stable/c/21f9cb44f8c60bf6c26487d428b1a09ad3e8aebf https://git.kernel.org/stable/c/6a4a08e45e614cfa7a56498cdfaeb7fae2f07fa0 https://git.kernel.org/stable/c/b38a4815f79b87efb196cd5121579fc51e29a7fb •

CVSS: -EPSS: 0%CPEs: 6EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check msg_id before processing transcation [WHY & HOW] HDCP_MESSAGE_ID_INVALID (-1) is not a valid msg_id nor is it a valid array index, and it needs checking before used. This fixes 4 OVERRUN issues reported by Coverity. • https://git.kernel.org/stable/c/916083054670060023d3f8a8ace895d710e268f4 https://git.kernel.org/stable/c/fe63daf7b10253b0faaa60c55d6153cd276927aa https://git.kernel.org/stable/c/0147505f08220c89b3a9c90eb608191276e263a8 https://git.kernel.org/stable/c/cb63090a17d3abb87f132851fa3711281249b7d2 https://git.kernel.org/stable/c/6590643c5de74098d27933b7d224d5ac065d7755 https://git.kernel.org/stable/c/fa71face755e27dc44bc296416ebdf2c67163316 •

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check link_index before accessing dc->links[] [WHY & HOW] dc->links[] has max size of MAX_LINKS and NULL is return when trying to access with out-of-bound index. This fixes 3 OVERRUN and 1 RESOURCE_LEAK issues reported by Coverity. • https://git.kernel.org/stable/c/ac04759b4a002969cf0f1384f1b8bb2001cfa782 https://git.kernel.org/stable/c/8aa2864044b9d13e95fe224f32e808afbf79ecdf •