We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check null pointer before dereferencing se [WHAT & HOW] se is null checked previously in the same function, indicating it might be null; therefore, it must be checked when used again. This fixes 1 FORWARD_NULL issue reported by Coverity.
Reserved 2024-10-21 | Published 2024-10-21 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/f4149eec960110ffd5bcb161075dd9f1d7773075
git.kernel.org/...c/c643ef59390e49f1dfab35e8ea65f5db5e527d64
git.kernel.org/...c/97a79933fb08a002ba9400d1a7a5df707ecdb896
git.kernel.org/...c/65b2d49e55fe13ae56da3a7685bdccadca31134a
git.kernel.org/...c/a9b4fd1946678fa0e069e442f3c5a7d3fa446fac
git.kernel.org/...c/ff599ef6970ee000fa5bc38d02fa5ff5f3fc7575
Support options