The following table lists the changes that have been made to the
CVE-2025-38254 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by 416baaa9-dc9f-4396-8d5f-8c081fb06d67Jul. 09, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add sanity checks for drm_edid_raw()
When EDID is retrieved via drm_edid_raw(), it doesn’t guarantee to
return proper EDID bytes the caller wants: it may be either NULL (that
leads to an Oops) or with too long bytes over the fixed size raw_edid
array (that may lead to memory corruption). The latter was reported
actually when connected with a bad adapter.Add sanity checks for drm_edid_raw() to address the above corner
cases, and return EDID_BAD_INPUT accordingly.(cherry picked from commit 648d3f4d209725d51900d6a3ed46b7b600140cdf)
Added Reference https://git.kernel.org/stable/c/4b63507d7cd243574753c6b91f68516d9103f1de Added Reference https://git.kernel.org/stable/c/6847b3b6e84ef37451c074e6a8db3fbd250c8dbf