We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: drm/sti: avoid potential dereference of error pointers The return value of drm_atomic_get_crtc_state() needs to be checked. To avoid use of error pointer 'crtc_state' in case of the failure.
Reserved 2024-12-29 | Published 2025-01-08 | Updated 2025-01-20 | Assigner Linuxgit.kernel.org/...c/e98ff67f5a68114804607de549c2350d27628fc7
git.kernel.org/...c/40725c5fabee804fecce41d4d5c5bae80c45e1c4
git.kernel.org/...c/8ab73ac97c0fa528f66eeccd9bb53eb6eb7d20dc
git.kernel.org/...c/f67786293193cf01ebcc6fdbcbd1587b24f52679
git.kernel.org/...c/831214f77037de02afc287eae93ce97f218d8c04
Support options