CVE-2024-26938

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-26938
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26938.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-26938
Downstream
Related
Published
2024-05-01T05:17:40.173Z
Modified
2025-11-28T02:35:01.847389Z
Summary
drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode()
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/i915/bios: Tolerate devdata==NULL in intelbiosencodersupportsdpdualmode()

If we have no VBT, or the VBT didn't declare the encoder in question, we won't have the 'devdata' for the encoder. Instead of oopsing just bail early.

We won't be able to tell whether the port is DP++ or not, but so be it.

(cherry picked from commit 26410896206342c8a80d2b027923e9ee7d33b733)

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26938.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
72e4d3fb72e9f0f016946158a7d95304832768e6
Fixed
a891add409e3bc381f4f68c2ce9d953f1865cb1f
Fixed
f4bbac954d8f9ab214ea1d4f385de4fa6bd92dd0
Fixed
94cf2fb6feccd625e5b4e23e1b70f39a206f82ac
Fixed
32e39bab59934bfd3f37097d4dd85ac5eb0fd549

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.84
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.24
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.12
Type
ECOSYSTEM
Events
Introduced
6.8.0
Fixed
6.8.3