-

CVE-2025-38254

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add sanity checks for drm_edid_raw()

When EDID is retrieved via drm_edid_raw(), it doesn't guarantee to
return proper EDID bytes the caller wants: it may be either NULL (that
leads to an Oops) or with too long bytes over the fixed size raw_edid
array (that may lead to memory corruption).  The latter was reported
actually when connected with a bad adapter.

Add sanity checks for drm_edid_raw() to address the above corner
cases, and return EDID_BAD_INPUT accordingly.

(cherry picked from commit 648d3f4d209725d51900d6a3ed46b7b600140cdf)

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 4b63507d7cd243574753c6b91f68516d9103f1de
Version 48edb2a4256eedf6c92eecf2bc7744e6ecb44b5e
Status affected
Version < 6847b3b6e84ef37451c074e6a8db3fbd250c8dbf
Version 48edb2a4256eedf6c92eecf2bc7744e6ecb44b5e
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 6.13
Status affected
Version < 6.13
Version 0
Status unaffected
Version <= 6.15.*
Version 6.15.5
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.06
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string