Описание
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
The "instance" variable needs to be signed for the error handling to work.
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
The "instance" variable needs to be signed for the error handling to work.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-41022
- https://git.kernel.org/stable/c/298e2ce222e712ffafa47288c5b2fcf33d72fda3
- https://git.kernel.org/stable/c/3dd9734878a9042f0358301d19a2b006a0fc4d06
- https://git.kernel.org/stable/c/4edb0a84e6b32e75dc9bd6dd085b2c2ff19ec287
- https://git.kernel.org/stable/c/544fa213f15d27f0370795845d55eeb3e00080d2
- https://git.kernel.org/stable/c/6769a23697f17f9bf9365ca8ed62fe37e361a05a
- https://git.kernel.org/stable/c/a5224e2123ce21102f346f518db80f004d5053a7
- https://git.kernel.org/stable/c/d347c9a398bf7eab9408d207c0a50fb720f9de7d
- https://git.kernel.org/stable/c/e8dfbf83a82bbfb9680921719fbe65e535af59ea
EPSS
CVE ID
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() The "instance" variable needs to be signed for the error handling to work.
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() The "instance" variable needs to be signed for the error handling to work.
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() The "instance" variable needs to be signed for the error handling to work.
In the Linux kernel, the following vulnerability has been resolved: d ...
Уязвимость функции sdma_v4_0_process_trap_irq ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
EPSS