Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8pcm-j4xj-qhj7

Опубликовано: 09 дек. 2025
Источник: github
Github: Не прошло ревью

Описание

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: populate subvp cmd info only for the top pipe

[Why] System restart observed while changing the display resolution to 8k with extended mode. Sytem restart was caused by a page fault.

[How] When the driver populates subvp info it did it for both the pipes using vblank which caused an outof bounds array access causing the page fault. added checks to allow the top pipe only to fix this issue.

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: populate subvp cmd info only for the top pipe

[Why] System restart observed while changing the display resolution to 8k with extended mode. Sytem restart was caused by a page fault.

[How] When the driver populates subvp info it did it for both the pipes using vblank which caused an outof bounds array access causing the page fault. added checks to allow the top pipe only to fix this issue.

EPSS

Процентиль: 6%
0.00024
Низкий

Связанные уязвимости

ubuntu
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: populate subvp cmd info only for the top pipe [Why] System restart observed while changing the display resolution to 8k with extended mode. Sytem restart was caused by a page fault. [How] When the driver populates subvp info it did it for both the pipes using vblank which caused an outof bounds array access causing the page fault. added checks to allow the top pipe only to fix this issue.

nvd
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: populate subvp cmd info only for the top pipe [Why] System restart observed while changing the display resolution to 8k with extended mode. Sytem restart was caused by a page fault. [How] When the driver populates subvp info it did it for both the pipes using vblank which caused an outof bounds array access causing the page fault. added checks to allow the top pipe only to fix this issue.

debian
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: d ...

suse-cvrf
11 дней назад

Security update for the Linux Kernel

EPSS

Процентиль: 6%
0.00024
Низкий