We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38080

drm/amd/display: Increase block_sequence array size



Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Increase block_sequence array size [Why] It's possible to generate more than 50 steps in hwss_build_fast_sequence, for example with a 6-pipe asic where all pipes are in one MPC chain. This overflows the block_sequence buffer and corrupts block_sequence_steps, causing a crash. [How] Expand block_sequence to 100 items. A naive upper bound on the possible number of steps for a 6-pipe asic, ignoring the potential for steps to be mutually exclusive, is 91 with current code, therefore 100 is sufficient.

Reserved 2025-04-16 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before de67e80ab48f1f23663831007a2fa3c1471a7757
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e55c5704b12eeea27e212bfab8f7e51ad3e8ac1f
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before bf1666072e7482317cf2302621766482a21a62c7
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 3a7810c212bcf2f722671dadf4b23ff70a7d23ee
affected

Default status
affected

6.6.93
unaffected

6.12.31
unaffected

6.14.9
unaffected

6.15
unaffected

References

git.kernel.org/...c/de67e80ab48f1f23663831007a2fa3c1471a7757

git.kernel.org/...c/e55c5704b12eeea27e212bfab8f7e51ad3e8ac1f

git.kernel.org/...c/bf1666072e7482317cf2302621766482a21a62c7

git.kernel.org/...c/3a7810c212bcf2f722671dadf4b23ff70a7d23ee

cve.org (CVE-2025-38080)

nvd.nist.gov (CVE-2025-38080)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38080

Support options

Helpdesk Chat, Email, Knowledgebase