Page 9 of 4411 results (0.006 seconds)

CVSS: -EPSS: %CPEs: 5EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ Make sure the connector is fully initialized before signalling any HPD events via drm_kms_helper_hotplug_event(), otherwise this may lead to NULL pointer dereference. • https://git.kernel.org/stable/c/adc5674c23b8191e596ed0dbaa9600265ac896a8 https://git.kernel.org/stable/c/e1b121f21bbc56a6ae035aa5b77daac62bfb9be5 https://git.kernel.org/stable/c/9d567126474e68f959b2c2543c375f3bb32e948a https://git.kernel.org/stable/c/1fb13693953737783b424aa4712f0a27a9eaf5a8 https://git.kernel.org/stable/c/162e48cb1d84c2c966b649b8ac5c9d4f75f6d44f •

CVSS: -EPSS: %CPEs: 3EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check BIOS images before it is used BIOS images may fail to load and null checks are added before they are used. This fixes 6 NULL_RETURNS issues reported by Coverity. • https://git.kernel.org/stable/c/e50bec62acaeec03afc6fa5dfb2426e52d049cf5 https://git.kernel.org/stable/c/e46b70a7cfed71cb84e985c785c39c16df5c28cb https://git.kernel.org/stable/c/8b0ddf19cca2a352b2a7e01d99d3ba949a99c84c •

CVSS: -EPSS: %CPEs: 2EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add missing NULL pointer check within dpcd_extend_address_range [Why & How] ASSERT if return NULL from kcalloc. • https://git.kernel.org/stable/c/ca0b0b0a22306f2e51105ac48f4a09c2fbbb504e https://git.kernel.org/stable/c/5524fa301ba649f8cf00848f91468e0ba7e4f24c •

CVSS: -EPSS: %CPEs: 5EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/amdgpu: Check tbo resource pointer Validate tbo resource pointer, skip if NULL • https://git.kernel.org/stable/c/e55e3904ffeaff81715256a711b1a61f4ad5258a https://git.kernel.org/stable/c/2be1eb6304d9623ba21dd6f3e68ffb753a759635 https://git.kernel.org/stable/c/4dfec5f5501a27e0a0da00e136d65ef9011ded4c https://git.kernel.org/stable/c/e8765364d4f3aaf88c7abe0a4fc99089d059ab49 https://git.kernel.org/stable/c/6cd2b872643bb29bba01a8ac739138db7bd79007 •

CVSS: -EPSS: %CPEs: 3EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix the warning division or modulo by zero Checks the partition mode and returns an error for an invalid mode. • https://git.kernel.org/stable/c/d116bb921e8b104f45d1f30a473ea99ef4262b9a https://git.kernel.org/stable/c/a01618adcba78c6bd6c4557a4a5e32f58b658cd1 https://git.kernel.org/stable/c/1a00f2ac82d6bc6689388c7edcd2a4bd82664f3c •