Page 90 of 3656 results (0.007 seconds)

CVSS: -EPSS: 0%CPEs: 6EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: the warning dereferencing obj for nbio_v7_4 if ras_manager obj null, don't print NBIO err data • https://git.kernel.org/stable/c/614564a5b28983de53b23a358ebe6c483a2aa21e https://git.kernel.org/stable/c/d04ded1e73f1dcf19a71ec8b9cda3faa7acd8828 https://git.kernel.org/stable/c/70e8ec21fcb8c51446899d3bfe416b31adfa3661 https://git.kernel.org/stable/c/7d265772e44d403071a2b573eac0db60250b1c21 https://git.kernel.org/stable/c/130c2dc75c8c40acc3c96ededea6af80e03c14b8 https://git.kernel.org/stable/c/d190b459b2a4304307c3468ed97477b808381011 •

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check gpio_id before used as array index [WHY & HOW] GPIO_ID_UNKNOWN (-1) is not a valid value for array index and therefore should be checked in advance. This fixes 5 OVERRUN issues reported by Coverity. • https://git.kernel.org/stable/c/8520fdc8ecc38f240a8e9e7af89cca6739c3e790 https://git.kernel.org/stable/c/40c2e8bc117cab8bca8814735f28a8b121654a84 https://git.kernel.org/stable/c/0184cca30cad74d88f5c875d4e26999e26325700 https://git.kernel.org/stable/c/276e3fd93e3beb5894eb1cc8480f9f417d51524d https://git.kernel.org/stable/c/08e7755f754e3d2cef7d3a7da538d33526bd6f7c https://git.kernel.org/stable/c/3d4198ab612ad48f73383ad3bb5663e6f0cdf406 https://git.kernel.org/stable/c/2a5626eeb3b5eec7a36886f9556113dd93ec8ed6 •

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 [Why] Coverity reports OVERRUN warning. Should abort amdgpu_dm initialize. [How] Return failure to amdgpu_dm_init. • https://git.kernel.org/stable/c/d619b91d3c4af60ac422f1763ce53d721fb91262 https://git.kernel.org/stable/c/754321ed63f0a4a31252ca72e0bd89a9e1888018 https://git.kernel.org/stable/c/21bbb39863f10f5fb4bf772d15b07d5d13590e9d https://git.kernel.org/stable/c/28b515c458aa9c92bfcb99884c94713a5f471cea https://git.kernel.org/stable/c/94cb77700fa4ae6200486bfa0ba2ac547534afd2 https://git.kernel.org/stable/c/d398c74c881dee695f6eb6138c9891644e1c3d9d https://git.kernel.org/stable/c/84723eb6068c50610c5c0893980d230d7afa2105 •

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links [Why] Coverity report OVERRUN warning. There are only max_links elements within dc->links. link count could up to AMDGPU_DM_MAX_DISPLAY_INDEX 31. [How] Make sure link count less than max_links. • https://git.kernel.org/stable/c/36c39a8dcce210649f2f45f252abaa09fcc1ae87 https://git.kernel.org/stable/c/cf8b16857db702ceb8d52f9219a4613363e2b1cf •

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] [WHY & HOW] num_valid_sets needs to be checked to avoid a negative index when accessing reader_wm_sets[num_valid_sets - 1]. This fixes an OVERRUN issue reported by Coverity. • https://git.kernel.org/stable/c/a72d4996409569027b4609414a14a87679b12267 https://git.kernel.org/stable/c/7c47dd2e92341f2989ab73dbed07f8894593ad7b https://git.kernel.org/stable/c/c4a7f7c0062fe2c73f70bb7e335199e25bd71492 https://git.kernel.org/stable/c/b36e9b3104c4ba0f2f5dd083dcf6159cb316c996 https://git.kernel.org/stable/c/21f9cb44f8c60bf6c26487d428b1a09ad3e8aebf https://git.kernel.org/stable/c/6a4a08e45e614cfa7a56498cdfaeb7fae2f07fa0 https://git.kernel.org/stable/c/b38a4815f79b87efb196cd5121579fc51e29a7fb •