๐Ÿ” CVE Alert

CVE-2025-38080

UNKNOWN 0.0

drm/amd/display: Increase block_sequence array size

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Increase block_sequence array size [Why] It's possible to generate more than 50 steps in hwss_build_fast_sequence, for example with a 6-pipe asic where all pipes are in one MPC chain. This overflows the block_sequence buffer and corrupts block_sequence_steps, causing a crash. [How] Expand block_sequence to 100 items. A naive upper bound on the possible number of steps for a 6-pipe asic, ignoring the potential for steps to be mutually exclusive, is 91 with current code, therefore 100 is sufficient.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jun 18, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < de67e80ab48f1f23663831007a2fa3c1471a7757 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < e55c5704b12eeea27e212bfab8f7e51ad3e8ac1f 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < bf1666072e7482317cf2302621766482a21a62c7 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < 3a7810c212bcf2f722671dadf4b23ff70a7d23ee
Linux / Linux
4.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/de67e80ab48f1f23663831007a2fa3c1471a7757 git.kernel.org: https://git.kernel.org/stable/c/e55c5704b12eeea27e212bfab8f7e51ad3e8ac1f git.kernel.org: https://git.kernel.org/stable/c/bf1666072e7482317cf2302621766482a21a62c7 git.kernel.org: https://git.kernel.org/stable/c/3a7810c212bcf2f722671dadf4b23ff70a7d23ee