Page 68 of 2356 results (0.018 seconds)

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add missing NULL pointer check within dpcd_extend_address_range [Why & How] ASSERT if return NULL from kcalloc. • https://git.kernel.org/stable/c/ca0b0b0a22306f2e51105ac48f4a09c2fbbb504e https://git.kernel.org/stable/c/5524fa301ba649f8cf00848f91468e0ba7e4f24c •

CVSS: -EPSS: 0%CPEs: 5EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/amdgpu: Check tbo resource pointer Validate tbo resource pointer, skip if NULL • https://git.kernel.org/stable/c/e55e3904ffeaff81715256a711b1a61f4ad5258a https://git.kernel.org/stable/c/2be1eb6304d9623ba21dd6f3e68ffb753a759635 https://git.kernel.org/stable/c/4dfec5f5501a27e0a0da00e136d65ef9011ded4c https://git.kernel.org/stable/c/e8765364d4f3aaf88c7abe0a4fc99089d059ab49 https://git.kernel.org/stable/c/6cd2b872643bb29bba01a8ac739138db7bd79007 •

CVSS: -EPSS: 0%CPEs: 3EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix the warning division or modulo by zero Checks the partition mode and returns an error for an invalid mode. • https://git.kernel.org/stable/c/d116bb921e8b104f45d1f30a473ea99ef4262b9a https://git.kernel.org/stable/c/a01618adcba78c6bd6c4557a4a5e32f58b658cd1 https://git.kernel.org/stable/c/1a00f2ac82d6bc6689388c7edcd2a4bd82664f3c •

CVSS: -EPSS: 0%CPEs: 5EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix the waring dereferencing hive Check the amdgpu_hive_info *hive that maybe is NULL. • https://git.kernel.org/stable/c/f20d1d5cbb39802f68be24458861094f3e66f356 https://git.kernel.org/stable/c/01cd55b971131b07b7ff8d622fa93bb4f8be07df https://git.kernel.org/stable/c/4ab720b6aa1ef5e71db1e534b5b45c80ac4ec58a https://git.kernel.org/stable/c/d3f927ef0607b3c8c3f79ab6d9a4ebead3e35f4c https://git.kernel.org/stable/c/1940708ccf5aff76de4e0b399f99267c93a89193 •

CVSS: -EPSS: 0%CPEs: 6EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add array index check for hdcp ddc access [Why] Coverity reports OVERRUN warning. Do not check if array index valid. [How] Check msg_id valid and valid array index. • https://git.kernel.org/stable/c/2a63c90c7a90ab2bd23deebc2814fc5b52abf6d2 https://git.kernel.org/stable/c/0ee4387c5a4b57ec733c3fb4365188d5979cd9c7 https://git.kernel.org/stable/c/f338f99f6a04d03c802087d82a83561cbd5bdc99 https://git.kernel.org/stable/c/8b5ccf3d011969417be653b5a145c72dbd30472c https://git.kernel.org/stable/c/a3b5ee22a9d3a30045191da5678ca8451ebaea30 https://git.kernel.org/stable/c/4e70c0f5251c25885c31ee84a31f99a01f7cf50e •