We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Skip wbscl_set_scaler_filter if filter is null Callers can pass null in filter (i.e. from returned from the function wbscl_get_filter_coeffs_16p) and a null check is added to ensure that is not the case. This fixes 4 NULL_RETURNS issues reported by Coverity.
Reserved 2024-09-11 | Published 2024-09-18 | Updated 2024-11-05 | Assigner Linuxgit.kernel.org/...c/0364f1f17a86d89dc39040beea4f099e60189f1b
git.kernel.org/...c/c083c8be6bdd046049884bec076660d4ec9a19ca
git.kernel.org/...c/6d94c05a13fadd80c3e732f14c83b2632ebfaa50
git.kernel.org/...c/1726914cb17cedab233820d26b86764dc08857b4
git.kernel.org/...c/e3a95f29647ae45d1ec9541cd7df64f40bf2120a
git.kernel.org/...c/54834585e91cab13e9f82d3a811deb212a4df786
git.kernel.org/...c/c4d31653c03b90e51515b1380115d1aedad925dd
Support options