In the Linux kernel, the following vulnerability has been resolved:
drm/bridge: anx7625: Fix overflow issue on reading EDID
The length of EDID block can be longer than 256 bytes, so we should use
`int` instead of `u8` for the `edid_pos` variable.
Metrics
Affected Vendors & Products
References
History
Mon, 22 Sep 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-190 | |
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
Fri, 28 Feb 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 26 Feb 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: drm/bridge: anx7625: Fix overflow issue on reading EDID The length of EDID block can be longer than 256 bytes, so we should use `int` instead of `u8` for the `edid_pos` variable. | |
| Title | drm/bridge: anx7625: Fix overflow issue on reading EDID | |
| References |
|
Status: PUBLISHED
Assigner: Linux
Published: 2025-02-26T01:55:53.799Z
Updated: 2025-05-04T08:32:46.609Z
Reserved: 2025-02-26T01:49:39.292Z
Link: CVE-2022-49222
No data.
Status : Analyzed
Published: 2025-02-26T07:00:59.260
Modified: 2025-09-22T21:01:57.970
Link: CVE-2022-49222
ReportizFlow