Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fixed integer types and null check locations [why]: issues fixed: - comparison with wider integer type in loop condition which can cause infinite loops - pointer dereference before null check
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 6.6.19 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/0484e05d048b66d01d1f3c1d2306010bb57d8738Patch
- https://git.kernel.org/stable/c/070fda699dfdce560755379bc428d9edada7a54e
- https://git.kernel.org/stable/c/71783d1ff65204d69207fd156d4b2eb1d3882375Patch
- https://git.kernel.org/stable/c/beea9ab9080cd2ef46296070bb327af066ee09d7Patch
- https://git.kernel.org/stable/c/0484e05d048b66d01d1f3c1d2306010bb57d8738Patch
- https://git.kernel.org/stable/c/71783d1ff65204d69207fd156d4b2eb1d3882375Patch
- https://git.kernel.org/stable/c/beea9ab9080cd2ef46296070bb327af066ee09d7Patch
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
FAQ
What is CVE-2024-26767?
CVE-2024-26767 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fixed integer types and null check locations [why]: issues fixed: - comparison with wider integer type in loop co...
How severe is CVE-2024-26767?
CVE-2024-26767 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-26767?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.