Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fixed integer types and null check locations [why]: issues fixed: - comparison with wider integer type in loop condition which can cause infinite loops - pointer dereference before null check
Product status
7ef414375fcc001b6d0745d2931d91c9c736e18d (git) before 070fda699dfdce560755379bc428d9edada7a54e
7ef414375fcc001b6d0745d2931d91c9c736e18d (git) before 71783d1ff65204d69207fd156d4b2eb1d3882375
7ef414375fcc001b6d0745d2931d91c9c736e18d (git) before beea9ab9080cd2ef46296070bb327af066ee09d7
7ef414375fcc001b6d0745d2931d91c9c736e18d (git) before 0484e05d048b66d01d1f3c1d2306010bb57d8738
6.1
Any version before 6.1
6.1.130 (semver)
6.6.19 (semver)
6.7.7 (semver)
6.8 (original_commit_for_fix)
References
git.kernel.org/...c/070fda699dfdce560755379bc428d9edada7a54e
git.kernel.org/...c/71783d1ff65204d69207fd156d4b2eb1d3882375
git.kernel.org/...c/beea9ab9080cd2ef46296070bb327af066ee09d7
git.kernel.org/...c/0484e05d048b66d01d1f3c1d2306010bb57d8738