In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Fix optc2_configure warning on dcn314
[Why] dcn314 uses optc2configurecrc() that wraps optc1configurecrc() + set additional registers not applicable to dcn314. It's not critical but when used leads to warning like: WARNING: drivers/gpu/drm/amd/amdgpu/../display/dc/dchelper.c Call Trace: <TASK> genericregsetex+0x6d/0xe0 [amdgpu] optc2configurecrc+0x60/0x80 [amdgpu] dcstreamconfigurecrc+0x129/0x150 [amdgpu] amdgpudmcrtcconfigurecrcsource+0x5d/0xe0 [amdgpu]
[How] Use optc1configurecrc() directly
[
{
"id": "CVE-2022-49773-4a41e507",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e7e4f77c991c9abf90924929a9d55f90b0bb78de",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"51019388601339894942421200541477094709",
"141620845682647106086358065658401839243",
"39098322461237984539842781465571900679",
"123706061709817478709462237016854870131"
]
},
"deprecated": false,
"target": {
"file": "drivers/gpu/drm/amd/display/dc/dcn314/dcn314_optc.c"
}
},
{
"id": "CVE-2022-49773-682ecbaa",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f67ef5aa88e3db0a13ae3befab2ddf14ac00a91c",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"51019388601339894942421200541477094709",
"141620845682647106086358065658401839243",
"39098322461237984539842781465571900679",
"123706061709817478709462237016854870131"
]
},
"deprecated": false,
"target": {
"file": "drivers/gpu/drm/amd/display/dc/dcn314/dcn314_optc.c"
}
}
]