Page 99 of 4416 results (0.008 seconds)

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add otg_master NULL check within resource_log_pipe_topology_update [Why] Coverity reports NULL_RETURN warning. [How] Add otg_master NULL check. • https://git.kernel.org/stable/c/aad4d3d3d3b6a362bf5db11e1f28c4a60620900d https://git.kernel.org/stable/c/871cd9d881fa791d3f82885000713de07041c0ae •

CVSS: -EPSS: 0%CPEs: 4EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Ensure index calculation will not overflow [WHY & HOW] Make sure vmid0p72_idx, vnom0p8_idx and vmax0p9_idx calculation will never overflow and exceess array size. This fixes 3 OVERRUN and 1 INTEGER_OVERFLOW issues reported by Coverity. • https://git.kernel.org/stable/c/733ae185502d30bbe79575167b6178cfb6c5d6bd https://git.kernel.org/stable/c/3dc6bb57dab36b38b7374af0ac916174c146b6ed https://git.kernel.org/stable/c/d705b5869f6b1b46ad5ceb1bd2a08c04f7e5003b https://git.kernel.org/stable/c/8e2734bf444767fed787305ccdcb36a2be5301a2 •

CVSS: -EPSS: 0%CPEs: 6EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix out-of-bounds write warning Check the ring type value to fix the out-of-bounds write warning • https://git.kernel.org/stable/c/c253b87c7c37ec40a2e0c84e4a6b636ba5cd66b2 https://git.kernel.org/stable/c/919f9bf9997b8dcdc132485ea96121e7d15555f9 https://git.kernel.org/stable/c/cf2db220b38301b6486a0f11da24a0f317de558c https://git.kernel.org/stable/c/a60d1f7ff62e453dde2d3b4907e178954d199844 https://git.kernel.org/stable/c/130bee397b9cd52006145c87a456fd8719390cb5 https://git.kernel.org/stable/c/be1684930f5262a622d40ce7a6f1423530d87f89 •

CVSS: -EPSS: 0%CPEs: 6EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number Check the fb_channel_number range to avoid the array out-of-bounds read error • https://git.kernel.org/stable/c/725b728cc0c8c5fafdfb51cb0937870d33a40fa4 https://git.kernel.org/stable/c/45f7b02afc464c208e8f56bcbc672ef5c364c815 https://git.kernel.org/stable/c/32915dc909ff502823babfe07d5416c5b6e8a8b1 https://git.kernel.org/stable/c/f9267972490f9fcffe146e79828e97acc0da588c https://git.kernel.org/stable/c/db7a86676fd624768a5d907faf34ad7bb4ff25f4 https://git.kernel.org/stable/c/d768394fa99467bcf2703bde74ddc96eeb0b71fa •

CVSS: -EPSS: 0%CPEs: 8EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix ucode out-of-bounds read warning Clear warning that read ucode[] may out-of-bounds. • https://git.kernel.org/stable/c/82ac8f1d02886b5d8aeb9e058989d3bd6fc581e2 https://git.kernel.org/stable/c/e789e05388854a5436b2b5d8695fdb864c9bcc27 https://git.kernel.org/stable/c/5f09fa5e0ad45fbca71933a0e024ca52da47d59b https://git.kernel.org/stable/c/0bef65e069d84d1cd77ce757aea0e437b8e2bd33 https://git.kernel.org/stable/c/8981927ebc6c12fa76b30c4178acb462bab15f54 https://git.kernel.org/stable/c/f2b7a9f3839e92f43559b2795b34640ca8cf839f https://git.kernel.org/stable/c/23fefef859c6057e6770584242bdd938254f8ddd https://git.kernel.org/stable/c/8944acd0f9db33e17f387fdc75d33bb47 •