Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: add null check [WHY] Prevents null pointer dereferences to enhance function robustness [HOW] Adds early null check and return false if invalid.

PUBLISHED Reserved 2025-04-16 | Published 2025-09-11 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c (git) before 13895744e2c639324cf3cb18f2ba4e3f400dd0dd
affected

4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c (git) before 10d97cc1a14ef1f611e156b0b27e8b226e103cc2
affected

4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c (git) before 158b9201c17fc93ed4253c2f03b77fd2671669a1
affected

Default status
affected

4.15
affected

Any version before 4.15
unaffected

6.15.11 (semver)
unaffected

6.16.2 (semver)
unaffected

6.17 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/13895744e2c639324cf3cb18f2ba4e3f400dd0dd

git.kernel.org/...c/10d97cc1a14ef1f611e156b0b27e8b226e103cc2

git.kernel.org/...c/158b9201c17fc93ed4253c2f03b77fd2671669a1

cve.org (CVE-2025-39762)

nvd.nist.gov (CVE-2025-39762)

Download JSON