Page 65 of 3107 results (0.008 seconds)

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check link_index before accessing dc->links[] [WHY & HOW] dc->links[] has max size of MAX_LINKS and NULL is return when trying to access with out-of-bound index. This fixes 3 OVERRUN and 1 RESOURCE_LEAK issues reported by Coverity. • https://git.kernel.org/stable/c/ac04759b4a002969cf0f1384f1b8bb2001cfa782 https://git.kernel.org/stable/c/8aa2864044b9d13e95fe224f32e808afbf79ecdf •

CVSS: -EPSS: 0%CPEs: 4EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration [Why] Coverity reports Memory - illegal accesses. [How] Skip inactive planes. • https://git.kernel.org/stable/c/3300a039caf850376bc3416c808cd8879da412bb https://git.kernel.org/stable/c/8406158a546441b73f0b216aedacbf9a1e5748fb https://git.kernel.org/stable/c/ee9d6df6d9172917d9ddbd948bb882652d5ecd29 https://git.kernel.org/stable/c/a54f7e866cc73a4cb71b8b24bb568ba35c8969df •

CVSS: -EPSS: 0%CPEs: 3EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box [Why] Coverity reports OVERRUN warning. soc.num_states could be 40. But array range of bw_params->clk_table.entries is 8. [How] Assert if soc.num_states greater than 8. • https://git.kernel.org/stable/c/4003bac784380fed1f94f197350567eaa73a409d https://git.kernel.org/stable/c/aba188d6f4ebaf52acf13f204db2bd2c22072504 https://git.kernel.org/stable/c/188fd1616ec43033cedbe343b6579e9921e2d898 •

CVSS: -EPSS: 0%CPEs: 5EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ Make sure the connector is fully initialized before signalling any HPD events via drm_kms_helper_hotplug_event(), otherwise this may lead to NULL pointer dereference. • https://git.kernel.org/stable/c/adc5674c23b8191e596ed0dbaa9600265ac896a8 https://git.kernel.org/stable/c/e1b121f21bbc56a6ae035aa5b77daac62bfb9be5 https://git.kernel.org/stable/c/9d567126474e68f959b2c2543c375f3bb32e948a https://git.kernel.org/stable/c/1fb13693953737783b424aa4712f0a27a9eaf5a8 https://git.kernel.org/stable/c/162e48cb1d84c2c966b649b8ac5c9d4f75f6d44f •

CVSS: -EPSS: 0%CPEs: 3EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check BIOS images before it is used BIOS images may fail to load and null checks are added before they are used. This fixes 6 NULL_RETURNS issues reported by Coverity. • https://git.kernel.org/stable/c/e50bec62acaeec03afc6fa5dfb2426e52d049cf5 https://git.kernel.org/stable/c/e46b70a7cfed71cb84e985c785c39c16df5c28cb https://git.kernel.org/stable/c/8b0ddf19cca2a352b2a7e01d99d3ba949a99c84c •