In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Fix optc2_configure warning on dcn314
[Why] dcn314 uses optc2configurecrc() that wraps optc1configurecrc() + set additional registers not applicable to dcn314. It's not critical but when used leads to warning like: WARNING: drivers/gpu/drm/amd/amdgpu/../display/dc/dchelper.c Call Trace: <TASK> genericregsetex+0x6d/0xe0 [amdgpu] optc2configurecrc+0x60/0x80 [amdgpu] dcstreamconfigurecrc+0x129/0x150 [amdgpu] amdgpudmcrtcconfigurecrcsource+0x5d/0xe0 [amdgpu]
[How] Use optc1configurecrc() directly
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49773.json"
}[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"51019388601339894942421200541477094709",
"141620845682647106086358065658401839243",
"39098322461237984539842781465571900679",
"123706061709817478709462237016854870131"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2022-49773-4a41e507",
"target": {
"file": "drivers/gpu/drm/amd/display/dc/dcn314/dcn314_optc.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e7e4f77c991c9abf90924929a9d55f90b0bb78de"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"51019388601339894942421200541477094709",
"141620845682647106086358065658401839243",
"39098322461237984539842781465571900679",
"123706061709817478709462237016854870131"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2022-49773-682ecbaa",
"target": {
"file": "drivers/gpu/drm/amd/display/dc/dcn314/dcn314_optc.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f67ef5aa88e3db0a13ae3befab2ddf14ac00a91c"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49773.json"