Количество 10
Количество 10
GHSA-4hcp-rr7c-2jm2
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid overflow assignment in link_dp_cts sampling_rate is an uint8_t but is assigned an unsigned int, and thus it can overflow. As a result, sampling_rate is changed to uint32_t. Similarly, LINK_QUAL_PATTERN_SET has a size of 2 bits, and it should only be assigned to a value less or equal than 4. This fixes 2 INTEGER_OVERFLOW issues reported by Coverity.
CVE-2024-50016
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-50016
[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid overflow assignment in link_dp_cts sampling_rate is an uint8_t but is assigned an unsigned int, and thus it can overflow. As a result, sampling_rate is changed to uint32_t. Similarly, LINK_QUAL_PATTERN_SET has a size of 2 bits, and it should only be assigned to a value less or equal than 4. This fixes 2 INTEGER_OVERFLOW issues reported by Coverity.
CVE-2024-50016
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-50016
BDU:2025-07975
Уязвимость компонента drm/amd/display ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2025:0153-1
Security update for the Linux Kernel
SUSE-SU-2025:0117-1
Security update for the Linux Kernel
SUSE-SU-2025:0154-1
Security update for the Linux Kernel
SUSE-SU-2025:0289-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-4hcp-rr7c-2jm2 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid overflow assignment in link_dp_cts sampling_rate is an uint8_t but is assigned an unsigned int, and thus it can overflow. As a result, sampling_rate is changed to uint32_t. Similarly, LINK_QUAL_PATTERN_SET has a size of 2 bits, and it should only be assigned to a value less or equal than 4. This fixes 2 INTEGER_OVERFLOW issues reported by Coverity. | CVSS3: 5.5 | около 1 года назад | ||
CVE-2024-50016 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | около 1 года назад | |||
CVE-2024-50016 [REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid overflow assignment in link_dp_cts sampling_rate is an uint8_t but is assigned an unsigned int, and thus it can overflow. As a result, sampling_rate is changed to uint32_t. Similarly, LINK_QUAL_PATTERN_SET has a size of 2 bits, and it should only be assigned to a value less or equal than 4. This fixes 2 INTEGER_OVERFLOW issues reported by Coverity. | CVSS3: 5.5 | около 1 года назад | ||
CVE-2024-50016 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | около 1 года назад | |||
| 8 месяцев назад | ||||
BDU:2025-07975 Уязвимость компонента drm/amd/display ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | около 1 года назад | ||
SUSE-SU-2025:0153-1 Security update for the Linux Kernel | 12 месяцев назад | |||
SUSE-SU-2025:0117-1 Security update for the Linux Kernel | 12 месяцев назад | |||
SUSE-SU-2025:0154-1 Security update for the Linux Kernel | 12 месяцев назад | |||
SUSE-SU-2025:0289-1 Security update for the Linux Kernel | 12 месяцев назад |
Уязвимостей на страницу