CVE-2025-38080
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-18

Last updated on: 2025-11-14

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Increase block_sequence array size [Why] It's possible to generate more than 50 steps in hwss_build_fast_sequence, for example with a 6-pipe asic where all pipes are in one MPC chain. This overflows the block_sequence buffer and corrupts block_sequence_steps, causing a crash. [How] Expand block_sequence to 100 items. A naive upper bound on the possible number of steps for a 6-pipe asic, ignoring the potential for steps to be mutually exclusive, is 91 with current code, therefore 100 is sufficient.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-18
Last Modified
2025-11-14
Generated
2026-05-07
AI Q&A
2025-06-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
linux linux_kernel From 5.15.160 (inc) to 5.16 (inc)
linux linux_kernel From 5.15.160 (inc) to 5.16 (inc)
linux linux_kernel From 5.15.160 (inc) to 5.16 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-NVD-CWE-noinfo
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in the Linux kernel's AMD display driver where the block_sequence array size was too small. Specifically, the hwss_build_fast_sequence function can generate more than 50 steps, such as on a 6-pipe ASIC with all pipes in one MPC chain, which causes the block_sequence buffer to overflow and corrupt block_sequence_steps, leading to a crash. The fix was to increase the block_sequence array size from 50 to 100 to safely accommodate up to 91 steps.


How can this vulnerability impact me? :

This vulnerability can cause a crash in the Linux kernel's AMD display driver due to buffer overflow and corruption of block_sequence_steps. This could lead to system instability or denial of service on affected systems using the vulnerable driver.


What immediate steps should I take to mitigate this vulnerability?

Update the Linux kernel to a version where the drm/amd/display component has been patched to increase the block_sequence array size to 100, preventing buffer overflow and crashes caused by hwss_build_fast_sequence generating more than 50 steps.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart