We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table The function atomctrl_initialize_mc_reg_table() and atomctrl_initialize_mc_reg_table_v2_2() does not check the return value of smu_atom_get_data_table(). If smu_atom_get_data_table() fails to retrieve vram_info, it returns NULL which is later dereferenced.
Reserved 2025-04-16 | Published 2025-07-10 | Updated 2025-07-10 | Assigner Linuxgit.kernel.org/...c/85cdcb834fb490731ff2d123f87ca799c57dacf2
git.kernel.org/...c/7080c20a9139842033ed4af604dc1fa4028593ad
git.kernel.org/...c/cdf7e1ff99ab06ef15d0b5d1aca5258a4fb62b85
git.kernel.org/...c/64f3acc8c7e6809631457b75638601b36dea3129
git.kernel.org/...c/a4ff7391c8b75b1541900bd9d0c238e558c11fb3
git.kernel.org/...c/820116a39f96bdc7d426c33a804b52f53700a919
Support options