๐Ÿ” CVE Alert

CVE-2025-38254

UNKNOWN 0.0

drm/amd/display: Add sanity checks for drm_edid_raw()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add sanity checks for drm_edid_raw() When EDID is retrieved via drm_edid_raw(), it doesn't guarantee to return proper EDID bytes the caller wants: it may be either NULL (that leads to an Oops) or with too long bytes over the fixed size raw_edid array (that may lead to memory corruption). The latter was reported actually when connected with a bad adapter. Add sanity checks for drm_edid_raw() to address the above corner cases, and return EDID_BAD_INPUT accordingly. (cherry picked from commit 648d3f4d209725d51900d6a3ed46b7b600140cdf)

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 9, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
48edb2a4256eedf6c92eecf2bc7744e6ecb44b5e < 4b63507d7cd243574753c6b91f68516d9103f1de 48edb2a4256eedf6c92eecf2bc7744e6ecb44b5e < 6847b3b6e84ef37451c074e6a8db3fbd250c8dbf
Linux / Linux
6.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/4b63507d7cd243574753c6b91f68516d9103f1de git.kernel.org: https://git.kernel.org/stable/c/6847b3b6e84ef37451c074e6a8db3fbd250c8dbf