In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Avoid overflow assignment in linkdpcts
samplingrate is an uint8t but is assigned an unsigned int, and thus it can overflow. As a result, samplingrate is changed to uint32t.
Similarly, LINKQUALPATTERN_SET has a size of 2 bits, and it should only be assigned to a value less or equal than 4.
This fixes 2 INTEGER_OVERFLOW issues reported by Coverity.