Page 69 of 2730 results (0.007 seconds)

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix incorrect size calculation for loop [WHY] fe_clk_en has size of 5 but sizeof(fe_clk_en) has byte size 20 which is lager than the array size. [HOW] Divide byte size 20 by its element size. This fixes 2 OVERRUN issues reported by Coverity. • https://git.kernel.org/stable/c/712be65b3b372a82bff0865b9c090147764bf1c4 https://git.kernel.org/stable/c/3941a3aa4b653b69876d894d08f3fff1cc965267 •

CVSS: -EPSS: 0%CPEs: 3EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check index for aux_rd_interval before using aux_rd_interval has size of 7 and should be checked. This fixes 3 OVERRUN and 1 INTEGER_OVERFLOW issues reported by Coverity. • https://git.kernel.org/stable/c/48e0b68e2360b16edf2a0bae05c0051c00fbb48a https://git.kernel.org/stable/c/6c588e9350dd7a9fb97a56fe74852c9ecc44450c https://git.kernel.org/stable/c/9ba2ea6337b4f159aecb177555a6a81da92d302e •

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add otg_master NULL check within resource_log_pipe_topology_update [Why] Coverity reports NULL_RETURN warning. [How] Add otg_master NULL check. • https://git.kernel.org/stable/c/aad4d3d3d3b6a362bf5db11e1f28c4a60620900d https://git.kernel.org/stable/c/871cd9d881fa791d3f82885000713de07041c0ae •

CVSS: -EPSS: 0%CPEs: 4EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Ensure index calculation will not overflow [WHY & HOW] Make sure vmid0p72_idx, vnom0p8_idx and vmax0p9_idx calculation will never overflow and exceess array size. This fixes 3 OVERRUN and 1 INTEGER_OVERFLOW issues reported by Coverity. • https://git.kernel.org/stable/c/733ae185502d30bbe79575167b6178cfb6c5d6bd https://git.kernel.org/stable/c/3dc6bb57dab36b38b7374af0ac916174c146b6ed https://git.kernel.org/stable/c/d705b5869f6b1b46ad5ceb1bd2a08c04f7e5003b https://git.kernel.org/stable/c/8e2734bf444767fed787305ccdcb36a2be5301a2 •

CVSS: -EPSS: 0%CPEs: 6EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix out-of-bounds write warning Check the ring type value to fix the out-of-bounds write warning • https://git.kernel.org/stable/c/c253b87c7c37ec40a2e0c84e4a6b636ba5cd66b2 https://git.kernel.org/stable/c/919f9bf9997b8dcdc132485ea96121e7d15555f9 https://git.kernel.org/stable/c/cf2db220b38301b6486a0f11da24a0f317de558c https://git.kernel.org/stable/c/a60d1f7ff62e453dde2d3b4907e178954d199844 https://git.kernel.org/stable/c/130bee397b9cd52006145c87a456fd8719390cb5 https://git.kernel.org/stable/c/be1684930f5262a622d40ce7a6f1423530d87f89 •