In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Increase block_sequence array size
[Why]
It's possible to generate more than 50 steps in hwss_build_fast_sequence,
for example with a 6-pipe asic where all pipes are in one MPC chain. This
overflows the block_sequence buffer and corrupts block_sequence_steps,
causing a crash.
[How]
Expand block_sequence to 100 items. A naive upper bound on the possible
number of steps for a 6-pipe asic, ignoring the potential for steps to be
mutually exclusive, is 91 with current code, therefore 100 is sufficient.
References
Configurations
Configuration 1 (hide)
|
History
14 Nov 2025, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/3a7810c212bcf2f722671dadf4b23ff70a7d23ee - Patch | |
| References | () https://git.kernel.org/stable/c/bf1666072e7482317cf2302621766482a21a62c7 - Patch | |
| References | () https://git.kernel.org/stable/c/de67e80ab48f1f23663831007a2fa3c1471a7757 - Patch | |
| References | () https://git.kernel.org/stable/c/e55c5704b12eeea27e212bfab8f7e51ad3e8ac1f - Patch | |
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | NVD-CWE-noinfo | |
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
18 Jun 2025, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-18 10:15
Updated : 2025-11-14 20:18
NVD link : CVE-2025-38080
Mitre link : CVE-2025-38080
CVE.ORG link : CVE-2025-38080
JSON object : View
Products Affected
linux
- linux_kernel
CWE
