Page 91 of 15150 results (0.011 seconds)

CVSS: -EPSS: 0%CPEs: 4EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Fix negative array index read Avoid using the negative values for clk_idex as an index into an array pptable->DpmDescriptor. V2: fix clk_index return check (Tim Huang) • https://git.kernel.org/stable/c/60f4a4bc3329e5cb8c4df0cc961f0d5ffd96e22d https://git.kernel.org/stable/c/4711b1347cb9f0c3083da6d87c624d75f9bd1d50 https://git.kernel.org/stable/c/06a3810010b525b9958424e344f0c25b09e128fa https://git.kernel.org/stable/c/c8c19ebf7c0b202a6a2d37a52ca112432723db5f •

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/vcn: remove irq disabling in vcn 5 suspend We do not directly enable/disable VCN IRQ in vcn 5.0.0. And we do not handle the IRQ state as well. • https://git.kernel.org/stable/c/aa92264ba6fd4fb570002f69762634221316e7ae https://git.kernel.org/stable/c/10fe1a79cd1bff3048e13120e93c02f8ecd05e9d •

CVSS: -EPSS: 0%CPEs: 6EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: the warning dereferencing obj for nbio_v7_4 if ras_manager obj null, don't print NBIO err data • https://git.kernel.org/stable/c/614564a5b28983de53b23a358ebe6c483a2aa21e https://git.kernel.org/stable/c/d04ded1e73f1dcf19a71ec8b9cda3faa7acd8828 https://git.kernel.org/stable/c/70e8ec21fcb8c51446899d3bfe416b31adfa3661 https://git.kernel.org/stable/c/7d265772e44d403071a2b573eac0db60250b1c21 https://git.kernel.org/stable/c/130c2dc75c8c40acc3c96ededea6af80e03c14b8 https://git.kernel.org/stable/c/d190b459b2a4304307c3468ed97477b808381011 •

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check gpio_id before used as array index [WHY & HOW] GPIO_ID_UNKNOWN (-1) is not a valid value for array index and therefore should be checked in advance. This fixes 5 OVERRUN issues reported by Coverity. • https://git.kernel.org/stable/c/8520fdc8ecc38f240a8e9e7af89cca6739c3e790 https://git.kernel.org/stable/c/40c2e8bc117cab8bca8814735f28a8b121654a84 https://git.kernel.org/stable/c/0184cca30cad74d88f5c875d4e26999e26325700 https://git.kernel.org/stable/c/276e3fd93e3beb5894eb1cc8480f9f417d51524d https://git.kernel.org/stable/c/08e7755f754e3d2cef7d3a7da538d33526bd6f7c https://git.kernel.org/stable/c/3d4198ab612ad48f73383ad3bb5663e6f0cdf406 https://git.kernel.org/stable/c/2a5626eeb3b5eec7a36886f9556113dd93ec8ed6 •

CVSS: -EPSS: 0%CPEs: 7EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 [Why] Coverity reports OVERRUN warning. • https://git.kernel.org/stable/c/d619b91d3c4af60ac422f1763ce53d721fb91262 https://git.kernel.org/stable/c/754321ed63f0a4a31252ca72e0bd89a9e1888018 https://git.kernel.org/stable/c/21bbb39863f10f5fb4bf772d15b07d5d13590e9d https://git.kernel.org/stable/c/28b515c458aa9c92bfcb99884c94713a5f471cea https://git.kernel.org/stable/c/94cb77700fa4ae6200486bfa0ba2ac547534afd2 https://git.kernel.org/stable/c/d398c74c881dee695f6eb6138c9891644e1c3d9d https://git.kernel.org/stable/c/84723eb6068c50610c5c0893980d230d7afa2105 •