We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check UnboundedRequestEnabled's value CalculateSwathAndDETConfiguration_params_st's UnboundedRequestEnabled is a pointer (i.e. dml_bool_t *UnboundedRequestEnabled), and thus if (p->UnboundedRequestEnabled) checks its address, not bool value. This fixes 1 REVERSE_INULL issue reported by Coverity.
Reserved 2024-09-11 | Published 2024-09-18 | Updated 2024-11-05 | Assigner Linuxgit.kernel.org/...c/4e2b49a85e7974d21364798c5d4aa8070aa864d9
git.kernel.org/...c/a7b38c7852093385d0605aa3c8a2efd6edd1edfd
Support options