In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Increase block_sequence array size
[Why]
It's possible to generate more than 50 steps in hwss_build_fast_sequence,
for example with a 6-pipe asic where all pipes are in one MPC chain. This
overflows the block_sequence buffer and corrupts block_sequence_steps,
causing a crash.
[How]
Expand block_sequence to 100 items. A naive upper bound on the possible
number of steps for a 6-pipe asic, ignoring the potential for steps to be
mutually exclusive, is 91 with current code, therefore 100 is sufficient.
CVSS
No CVSS.
References
Configurations
No configuration.
History
18 Jun 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-18 10:15
Updated : 2025-06-18 13:46
NVD link : CVE-2025-38080
Mitre link : CVE-2025-38080
CVE.ORG link : CVE-2025-38080
JSON object : View
Products Affected
No product.
CWE
No CWE.