We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | Linux |
Reserved | 2024-10-21 |
Published | 2024-10-21 |
Updated | 2024-11-05 |
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags [WHAT & HOW] "dcn20_validate_apply_pipe_split_flags" dereferences merge, and thus it cannot be a null pointer. Let's pass a valid pointer to avoid null dereference. This fixes 2 FORWARD_NULL issues reported by Coverity.
https://git.kernel.org/stable/c/85aa996ecfaa95d1e922867390502d23ce21b905
https://git.kernel.org/stable/c/9a05270869f40c89f8d184fe2d37cb86e0d7e5f5
https://git.kernel.org/stable/c/5559598742fb4538e4c51c48ef70563c49c2af23