CVE-2025-38254 – AMD Linux Kernel EDID Handling Buffer Overflow

The following table lists the changes that have been made to the
CVE-2025-38254 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Jul. 09, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved:

    drm/amd/display: Add sanity checks for drm_edid_raw()

    When EDID is retrieved via drm_edid_raw(), it doesn’t guarantee to
    return proper EDID bytes the caller wants: it may be either NULL (that
    leads to an Oops) or with too long bytes over the fixed size raw_edid
    array (that may lead to memory corruption). The latter was reported
    actually when connected with a bad adapter.

    Add sanity checks for drm_edid_raw() to address the above corner
    cases, and return EDID_BAD_INPUT accordingly.

    (cherry picked from commit 648d3f4d209725d51900d6a3ed46b7b600140cdf)

    Added Reference https://git.kernel.org/stable/c/4b63507d7cd243574753c6b91f68516d9103f1de
    Added Reference https://git.kernel.org/stable/c/6847b3b6e84ef37451c074e6a8db3fbd250c8dbf
Share the Post:

Related Posts