Page 56 of 3716 results (0.038 seconds)

CVSS: -EPSS: 0%CPEs: 6EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check msg_id before processing transcation [WHY & HOW] HDCP_MESSAGE_ID_INVALID (-1) is not a valid msg_id nor is it a valid array index, and it needs checking before used. This fixes 4 OVERRUN issues reported by Coverity. • https://git.kernel.org/stable/c/916083054670060023d3f8a8ace895d710e268f4 https://git.kernel.org/stable/c/fe63daf7b10253b0faaa60c55d6153cd276927aa https://git.kernel.org/stable/c/0147505f08220c89b3a9c90eb608191276e263a8 https://git.kernel.org/stable/c/cb63090a17d3abb87f132851fa3711281249b7d2 https://git.kernel.org/stable/c/6590643c5de74098d27933b7d224d5ac065d7755 https://git.kernel.org/stable/c/fa71face755e27dc44bc296416ebdf2c67163316 •

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check link_index before accessing dc->links[] [WHY & HOW] dc->links[] has max size of MAX_LINKS and NULL is return when trying to access with out-of-bound index. This fixes 3 OVERRUN and 1 RESOURCE_LEAK issues reported by Coverity. • https://git.kernel.org/stable/c/ac04759b4a002969cf0f1384f1b8bb2001cfa782 https://git.kernel.org/stable/c/8aa2864044b9d13e95fe224f32e808afbf79ecdf •

CVSS: -EPSS: 0%CPEs: 4EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration [Why] Coverity reports Memory - illegal accesses. [How] Skip inactive planes. • https://git.kernel.org/stable/c/3300a039caf850376bc3416c808cd8879da412bb https://git.kernel.org/stable/c/8406158a546441b73f0b216aedacbf9a1e5748fb https://git.kernel.org/stable/c/ee9d6df6d9172917d9ddbd948bb882652d5ecd29 https://git.kernel.org/stable/c/a54f7e866cc73a4cb71b8b24bb568ba35c8969df •

CVSS: -EPSS: 0%CPEs: 3EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box [Why] Coverity reports OVERRUN warning. soc.num_states could be 40. But array range of bw_params->clk_table.entries is 8. [How] Assert if soc.num_states greater than 8. • https://git.kernel.org/stable/c/4003bac784380fed1f94f197350567eaa73a409d https://git.kernel.org/stable/c/aba188d6f4ebaf52acf13f204db2bd2c22072504 https://git.kernel.org/stable/c/188fd1616ec43033cedbe343b6579e9921e2d898 •

CVSS: -EPSS: 0%CPEs: 5EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ Make sure the connector is fully initialized before signalling any HPD events via drm_kms_helper_hotplug_event(), otherwise this may lead to NULL pointer dereference. • https://git.kernel.org/stable/c/adc5674c23b8191e596ed0dbaa9600265ac896a8 https://git.kernel.org/stable/c/e1b121f21bbc56a6ae035aa5b77daac62bfb9be5 https://git.kernel.org/stable/c/9d567126474e68f959b2c2543c375f3bb32e948a https://git.kernel.org/stable/c/1fb13693953737783b424aa4712f0a27a9eaf5a8 https://git.kernel.org/stable/c/162e48cb1d84c2c966b649b8ac5c9d4f75f6d44f •