We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid overflow assignment in link_dp_cts sampling_rate is an uint8_t but is assigned an unsigned int, and thus it can overflow. As a result, sampling_rate is changed to uint32_t. Similarly, LINK_QUAL_PATTERN_SET has a size of 2 bits, and it should only be assigned to a value less or equal than 4. This fixes 2 INTEGER_OVERFLOW issues reported by Coverity.
Reserved 2024-10-21 | Published 2024-10-21 | Updated 2024-11-19 | Assigner Linuxgit.kernel.org/...c/a1495acc6234fa79b775599d3f49009afd53299f
git.kernel.org/...c/26ced9d86240868f5b41708ceee02e6ec2924498
git.kernel.org/...c/adeed800bc30ef718478b28c08f79231e5980e3d
git.kernel.org/...c/a15268787b79fd183dd526cc16bec9af4f4e49a1
Support options