Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-26938
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-01 May, 2024 | 05:17
Updated At-05 Jan, 2026 | 10:35
Rejected At-
▼CVE Numbering Authority (CNA)
drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode()

In the Linux kernel, the following vulnerability has been resolved: drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() If we have no VBT, or the VBT didn't declare the encoder in question, we won't have the 'devdata' for the encoder. Instead of oopsing just bail early. We won't be able to tell whether the port is DP++ or not, but so be it. (cherry picked from commit 26410896206342c8a80d2b027923e9ee7d33b733)

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/gpu/drm/i915/display/intel_bios.c
Default Status
unaffected
Versions
Affected
  • From 2bea1d7c594dd0643db23a8131c689384d0e5d8c before a891add409e3bc381f4f68c2ce9d953f1865cb1f (git)
  • From 2bea1d7c594dd0643db23a8131c689384d0e5d8c before f4bbac954d8f9ab214ea1d4f385de4fa6bd92dd0 (git)
  • From 2bea1d7c594dd0643db23a8131c689384d0e5d8c before 94cf2fb6feccd625e5b4e23e1b70f39a206f82ac (git)
  • From 2bea1d7c594dd0643db23a8131c689384d0e5d8c before 32e39bab59934bfd3f37097d4dd85ac5eb0fd549 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/gpu/drm/i915/display/intel_bios.c
Default Status
affected
Versions
Affected
  • 6.5
Unaffected
  • From 0 before 6.5 (semver)
  • From 6.6.24 through 6.6.* (semver)
  • From 6.7.12 through 6.7.* (semver)
  • From 6.8.3 through 6.8.* (semver)
  • From 6.9 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/a891add409e3bc381f4f68c2ce9d953f1865cb1f
N/A
https://git.kernel.org/stable/c/f4bbac954d8f9ab214ea1d4f385de4fa6bd92dd0
N/A
https://git.kernel.org/stable/c/94cf2fb6feccd625e5b4e23e1b70f39a206f82ac
N/A
https://git.kernel.org/stable/c/32e39bab59934bfd3f37097d4dd85ac5eb0fd549
N/A
Hyperlink: https://git.kernel.org/stable/c/a891add409e3bc381f4f68c2ce9d953f1865cb1f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f4bbac954d8f9ab214ea1d4f385de4fa6bd92dd0
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/94cf2fb6feccd625e5b4e23e1b70f39a206f82ac
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/32e39bab59934bfd3f37097d4dd85ac5eb0fd549
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/72e4d3fb72e9f0f016946158a7d95304832768e6
x_transferred
https://git.kernel.org/stable/c/a891add409e3bc381f4f68c2ce9d953f1865cb1f
x_transferred
https://git.kernel.org/stable/c/f4bbac954d8f9ab214ea1d4f385de4fa6bd92dd0
x_transferred
https://git.kernel.org/stable/c/94cf2fb6feccd625e5b4e23e1b70f39a206f82ac
x_transferred
https://git.kernel.org/stable/c/32e39bab59934bfd3f37097d4dd85ac5eb0fd549
x_transferred
Hyperlink: https://git.kernel.org/stable/c/72e4d3fb72e9f0f016946158a7d95304832768e6
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/a891add409e3bc381f4f68c2ce9d953f1865cb1f
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/f4bbac954d8f9ab214ea1d4f385de4fa6bd92dd0
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/94cf2fb6feccd625e5b4e23e1b70f39a206f82ac
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/32e39bab59934bfd3f37097d4dd85ac5eb0fd549
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found