We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes [WHY] When PTEBufferSizeInRequests is zero, UBSAN reports the following warning because dml_log2 returns an unexpected negative value: shift exponent 4294966273 is too large for 32-bit type 'int' [HOW] In the case PTEBufferSizeInRequests is zero, skip the dml_log2() and assign the result directly.
Reserved 2025-05-02 | Published 2025-05-02 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/7257070be70e19a9138f39009c1a26c83a8a7cfa
git.kernel.org/...c/bec1bea2fa974e63f6059c33edde669c7894d0bc
git.kernel.org/...c/a16394b5d661afec9a264fecac3abd87aea439ea
git.kernel.org/...c/e12b95680821b9880cd9992c0f3555389363604f
git.kernel.org/...c/031f196d1b1b6d5dfcb0533b431e3ab1750e6189
Support options