Page 52 of 2825 results (0.023 seconds)

CVSS: -EPSS: 0%CPEs: 4EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Ensure index calculation will not overflow [WHY & HOW] Make sure vmid0p72_idx, vnom0p8_idx and vmax0p9_idx calculation will never overflow and exceess array size. This fixes 3 OVERRUN and 1 INTEGER_OVERFLOW issues reported by Coverity. • https://git.kernel.org/stable/c/733ae185502d30bbe79575167b6178cfb6c5d6bd https://git.kernel.org/stable/c/3dc6bb57dab36b38b7374af0ac916174c146b6ed https://git.kernel.org/stable/c/d705b5869f6b1b46ad5ceb1bd2a08c04f7e5003b https://git.kernel.org/stable/c/8e2734bf444767fed787305ccdcb36a2be5301a2 •

CVSS: -EPSS: 0%CPEs: 6EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix out-of-bounds write warning Check the ring type value to fix the out-of-bounds write warning • https://git.kernel.org/stable/c/c253b87c7c37ec40a2e0c84e4a6b636ba5cd66b2 https://git.kernel.org/stable/c/919f9bf9997b8dcdc132485ea96121e7d15555f9 https://git.kernel.org/stable/c/cf2db220b38301b6486a0f11da24a0f317de558c https://git.kernel.org/stable/c/a60d1f7ff62e453dde2d3b4907e178954d199844 https://git.kernel.org/stable/c/130bee397b9cd52006145c87a456fd8719390cb5 https://git.kernel.org/stable/c/be1684930f5262a622d40ce7a6f1423530d87f89 •

CVSS: -EPSS: 0%CPEs: 6EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number Check the fb_channel_number range to avoid the array out-of-bounds read error • https://git.kernel.org/stable/c/725b728cc0c8c5fafdfb51cb0937870d33a40fa4 https://git.kernel.org/stable/c/45f7b02afc464c208e8f56bcbc672ef5c364c815 https://git.kernel.org/stable/c/32915dc909ff502823babfe07d5416c5b6e8a8b1 https://git.kernel.org/stable/c/f9267972490f9fcffe146e79828e97acc0da588c https://git.kernel.org/stable/c/db7a86676fd624768a5d907faf34ad7bb4ff25f4 https://git.kernel.org/stable/c/d768394fa99467bcf2703bde74ddc96eeb0b71fa •

CVSS: -EPSS: 0%CPEs: 8EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix ucode out-of-bounds read warning Clear warning that read ucode[] may out-of-bounds. • https://git.kernel.org/stable/c/82ac8f1d02886b5d8aeb9e058989d3bd6fc581e2 https://git.kernel.org/stable/c/e789e05388854a5436b2b5d8695fdb864c9bcc27 https://git.kernel.org/stable/c/5f09fa5e0ad45fbca71933a0e024ca52da47d59b https://git.kernel.org/stable/c/0bef65e069d84d1cd77ce757aea0e437b8e2bd33 https://git.kernel.org/stable/c/8981927ebc6c12fa76b30c4178acb462bab15f54 https://git.kernel.org/stable/c/f2b7a9f3839e92f43559b2795b34640ca8cf839f https://git.kernel.org/stable/c/23fefef859c6057e6770584242bdd938254f8ddd https://git.kernel.org/stable/c/8944acd0f9db33e17f387fdc75d33bb47 •

CVSS: -EPSS: 0%CPEs: 8EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix mc_data out-of-bounds read warning Clear warning that read mc_data[i-1] may out-of-bounds. • https://git.kernel.org/stable/c/5fa4df25ecfc7b6c9006f5b871c46cfe25ea8826 https://git.kernel.org/stable/c/2097edede72ec5bb3869cf0205337d392fb2a553 https://git.kernel.org/stable/c/310b9d8363b88e818afec97ca7652bd7fe3d0650 https://git.kernel.org/stable/c/345bd3ad387f9e121aaad9c95957b80895e2f2ec https://git.kernel.org/stable/c/b862a0bc5356197ed159fed7b1c647e77bc9f653 https://git.kernel.org/stable/c/d0a43bf367ed640e527e8ef3d53aac1e71f80114 https://git.kernel.org/stable/c/578ae965e8b90cd09edeb0252b50fa0503ea35c5 https://git.kernel.org/stable/c/51dfc0a4d609fe700750a62f41447f01b •