CVE-2025-38254

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/07/2025
Last modified:
19/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: Add sanity checks for drm_edid_raw()<br /> <br /> When EDID is retrieved via drm_edid_raw(), it doesn&amp;#39;t guarantee to<br /> return proper EDID bytes the caller wants: it may be either NULL (that<br /> leads to an Oops) or with too long bytes over the fixed size raw_edid<br /> array (that may lead to memory corruption). The latter was reported<br /> actually when connected with a bad adapter.<br /> <br /> Add sanity checks for drm_edid_raw() to address the above corner<br /> cases, and return EDID_BAD_INPUT accordingly.<br /> <br /> (cherry picked from commit 648d3f4d209725d51900d6a3ed46b7b600140cdf)

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.15.5 (excluding)
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*