CVE-2021-47444
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/05/2024
Last modified:
25/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read<br />
<br />
In commit e11f5bd8228f ("drm: Add support for DP 1.4 Compliance edid<br />
corruption test") the function connector_bad_edid() started assuming<br />
that the memory for the EDID passed to it was big enough to hold<br />
`edid[0x7e] + 1` blocks of data (1 extra for the base block). It<br />
completely ignored the fact that the function was passed `num_blocks`<br />
which indicated how much memory had been allocated for the EDID.<br />
<br />
Let&#39;s fix this by adding a bounds check.<br />
<br />
This is important for handling the case where there&#39;s an error in the<br />
first block of the EDID. In that case we will call<br />
connector_bad_edid() without having re-allocated memory based on<br />
`edid[0x7e]`.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.7 (including) | 5.10.75 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.14.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/09f3946bb452918dbfb1982add56f9ffaae393dc
- https://git.kernel.org/stable/c/97794170b696856483f74b47bfb6049780d2d3a0
- https://git.kernel.org/stable/c/a7b45024f66f9ec769e8dbb1a51ae83cd05929c7
- https://git.kernel.org/stable/c/09f3946bb452918dbfb1982add56f9ffaae393dc
- https://git.kernel.org/stable/c/97794170b696856483f74b47bfb6049780d2d3a0
- https://git.kernel.org/stable/c/a7b45024f66f9ec769e8dbb1a51ae83cd05929c7



