Linux

Linux Kernel

14302 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 18.09.2024 07:15:03
  • Zuletzt bearbeitet 03.11.2025 23:15:56

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix dereference after null check check the pointer hive before use.

  • EPSS 0.02%
  • Veröffentlicht 18.09.2024 07:15:03
  • Zuletzt bearbeitet 05.01.2026 11:17:07

In the Linux kernel, the following vulnerability has been resolved: apparmor: fix possible NULL pointer dereference profile->parent->dents[AAFS_PROF_DIR] could be NULL only if its parent is made from __create_missing_ancestors(..) and 'ent->old' is...

  • EPSS 0.02%
  • Veröffentlicht 18.09.2024 07:15:03
  • Zuletzt bearbeitet 03.11.2025 23:15:56

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix mc_data out-of-bounds read warning Clear warning that read mc_data[i-1] may out-of-bounds.

  • EPSS 0.02%
  • Veröffentlicht 18.09.2024 07:15:03
  • Zuletzt bearbeitet 03.11.2025 23:15:56

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix ucode out-of-bounds read warning Clear warning that read ucode[] may out-of-bounds.

  • EPSS 0.01%
  • Veröffentlicht 18.09.2024 07:15:03
  • Zuletzt bearbeitet 03.11.2025 23:15:56

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number Check the fb_channel_number range to avoid the array out-of-bounds read error

  • EPSS 0.03%
  • Veröffentlicht 18.09.2024 07:15:03
  • Zuletzt bearbeitet 03.11.2025 23:15:56

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix out-of-bounds write warning Check the ring type value to fix the out-of-bounds write warning

  • EPSS 0.02%
  • Veröffentlicht 18.09.2024 07:15:03
  • Zuletzt bearbeitet 03.11.2025 23:15:57

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Ensure index calculation will not overflow [WHY & HOW] Make sure vmid0p72_idx, vnom0p8_idx and vmax0p9_idx calculation will never overflow and exceess array size. ...

  • EPSS 0.03%
  • Veröffentlicht 18.09.2024 07:15:03
  • Zuletzt bearbeitet 30.09.2024 12:49:43

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add otg_master NULL check within resource_log_pipe_topology_update [Why] Coverity reports NULL_RETURN warning. [How] Add otg_master NULL check.

  • EPSS 0.05%
  • Veröffentlicht 18.09.2024 07:15:03
  • Zuletzt bearbeitet 26.09.2024 13:31:34

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check index for aux_rd_interval before using aux_rd_interval has size of 7 and should be checked. This fixes 3 OVERRUN and 1 INTEGER_OVERFLOW issues reported by C...

  • EPSS 0.03%
  • Veröffentlicht 18.09.2024 07:15:03
  • Zuletzt bearbeitet 26.09.2025 17:34:46

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix incorrect size calculation for loop [WHY] fe_clk_en has size of 5 but sizeof(fe_clk_en) has byte size 20 which is lager than the array size. [HOW] Divide byte...