Количество 17
Количество 17
CVE-2024-46871
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX [Why & How] It actually exposes '6' types in enum dmub_notification_type. Not 5. Using smaller number to create array dmub_callback & dmub_thread_offload has potential to access item out of array bound. Fix it.
CVE-2024-46871
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX [Why & How] It actually exposes '6' types in enum dmub_notification_type. Not 5. Using smaller number to create array dmub_callback & dmub_thread_offload has potential to access item out of array bound. Fix it.
CVE-2024-46871
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX [Why & How] It actually exposes '6' types in enum dmub_notification_type. Not 5. Using smaller number to create array dmub_callback & dmub_thread_offload has potential to access item out of array bound. Fix it.
CVE-2024-46871
drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
CVE-2024-46871
In the Linux kernel, the following vulnerability has been resolved: d ...
GHSA-qf32-pvhj-vvx7
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX [Why & How] It actually exposes '6' types in enum dmub_notification_type. Not 5. Using smaller number to create array dmub_callback & dmub_thread_offload has potential to access item out of array bound. Fix it.
BDU:2024-08979
Уязвимость определения массивов dmub_callback и dmub_thread_offload ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
ROS-20250310-01
Множественные уязвимости kernel-lt
ELSA-2025-20095
ELSA-2025-20095: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2024:4376-1
Security update for the Linux Kernel
SUSE-SU-2024:4315-1
Security update for the Linux Kernel
SUSE-SU-2024:3986-1
Security update for the Linux Kernel
SUSE-SU-2024:3984-1
Security update for the Linux Kernel
ELSA-2025-6966
ELSA-2025-6966: kernel security update (MODERATE)
SUSE-SU-2024:4364-1
Security update for the Linux Kernel
SUSE-SU-2024:4387-1
Security update for the Linux Kernel
SUSE-SU-2024:4318-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-46871 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX [Why & How] It actually exposes '6' types in enum dmub_notification_type. Not 5. Using smaller number to create array dmub_callback & dmub_thread_offload has potential to access item out of array bound. Fix it. | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
CVE-2024-46871 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX [Why & How] It actually exposes '6' types in enum dmub_notification_type. Not 5. Using smaller number to create array dmub_callback & dmub_thread_offload has potential to access item out of array bound. Fix it. | CVSS3: 4.7 | 0% Низкий | около 1 года назад | |
CVE-2024-46871 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX [Why & How] It actually exposes '6' types in enum dmub_notification_type. Not 5. Using smaller number to create array dmub_callback & dmub_thread_offload has potential to access item out of array bound. Fix it. | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
CVE-2024-46871 drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX | 0% Низкий | 2 месяца назад | ||
CVE-2024-46871 In the Linux kernel, the following vulnerability has been resolved: d ... | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
GHSA-qf32-pvhj-vvx7 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX [Why & How] It actually exposes '6' types in enum dmub_notification_type. Not 5. Using smaller number to create array dmub_callback & dmub_thread_offload has potential to access item out of array bound. Fix it. | CVSS3: 7.8 | 0% Низкий | около 1 года назад | |
BDU:2024-08979 Уязвимость определения массивов dmub_callback и dmub_thread_offload ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
ROS-20250310-01 Множественные уязвимости kernel-lt | CVSS3: 7.8 | 8 месяцев назад | ||
ELSA-2025-20095 ELSA-2025-20095: Unbreakable Enterprise kernel security update (IMPORTANT) | 9 месяцев назад | |||
SUSE-SU-2024:4376-1 Security update for the Linux Kernel | 11 месяцев назад | |||
SUSE-SU-2024:4315-1 Security update for the Linux Kernel | 11 месяцев назад | |||
SUSE-SU-2024:3986-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:3984-1 Security update for the Linux Kernel | около 1 года назад | |||
ELSA-2025-6966 ELSA-2025-6966: kernel security update (MODERATE) | 6 месяцев назад | |||
SUSE-SU-2024:4364-1 Security update for the Linux Kernel | 11 месяцев назад | |||
SUSE-SU-2024:4387-1 Security update for the Linux Kernel | 11 месяцев назад | |||
SUSE-SU-2024:4318-1 Security update for the Linux Kernel | 11 месяцев назад |
Уязвимостей на страницу