We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: drm/sun4i: dsi: Prevent underflow when computing packet sizes Currently, the packet overhead is subtracted using unsigned arithmetic. With a short sync pulse, this could underflow and wrap around to near the maximal u16 value. Fix this by using signed subtraction. The call to max() will correctly handle any negative numbers that are produced. Apply the same fix to the other timings, even though those subtractions are less likely to underflow.
Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linuxgit.kernel.org/...c/a1e7908f78f5a7f53f8cd83c7dcdfec974c95f26
git.kernel.org/...c/98e28de472ef248352f04f87e29e634ebb0ec240
git.kernel.org/...c/fb837f5b83461624e525727a8f4add14b201147e
git.kernel.org/...c/82a1356a933d8443139f8886f11b63c974a09a67
Support options