CVE-2025-38080
drm/amd/display: Increase block_sequence array size
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Increase block_sequence array size [Why] It's possible to generate more than 50 steps in hwss_build_fast_sequence, for example with a 6-pipe asic where all pipes are in one MPC chain. This overflows the block_sequence buffer and corrupts block_sequence_steps, causing a crash. [How] Expand block_sequence to 100 items. A naive upper bound on the possible number of steps for a 6-pipe asic, ignoring the potential for steps to be mutually exclusive, is 91 with current code, therefore 100 is sufficient.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Jun 18, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < de67e80ab48f1f23663831007a2fa3c1471a7757 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < e55c5704b12eeea27e212bfab8f7e51ad3e8ac1f 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < bf1666072e7482317cf2302621766482a21a62c7 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c < 3a7810c212bcf2f722671dadf4b23ff70a7d23ee
Linux / Linux
4.15
References
git.kernel.org: https://git.kernel.org/stable/c/de67e80ab48f1f23663831007a2fa3c1471a7757 git.kernel.org: https://git.kernel.org/stable/c/e55c5704b12eeea27e212bfab8f7e51ad3e8ac1f git.kernel.org: https://git.kernel.org/stable/c/bf1666072e7482317cf2302621766482a21a62c7 git.kernel.org: https://git.kernel.org/stable/c/3a7810c212bcf2f722671dadf4b23ff70a7d23ee