CVE-2025-38319

Source
https://cve.org/CVERecord?id=CVE-2025-38319
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38319.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38319
Downstream
Related
Published
2025-07-10T07:42:25.111Z
Modified
2026-05-07T04:16:52.880072Z
Summary
drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pp: Fix potential NULL pointer dereference in atomctrlinitializemcregtable

The function atomctrlinitializemcregtable() and atomctrlinitializemcregtablev22() does not check the return value of smuatomgetdatatable(). If smuatomgetdatatable() fails to retrieve vram_info, it returns NULL which is later dereferenced.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38319.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b3892e2bb519fe18225d0628f0dd255761f16502
Fixed
85cdcb834fb490731ff2d123f87ca799c57dacf2
Fixed
7080c20a9139842033ed4af604dc1fa4028593ad
Fixed
cdf7e1ff99ab06ef15d0b5d1aca5258a4fb62b85
Fixed
64f3acc8c7e6809631457b75638601b36dea3129
Fixed
a4ff7391c8b75b1541900bd9d0c238e558c11fb3
Fixed
820116a39f96bdc7d426c33a804b52f53700a919

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38319.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.18.0
Fixed
5.15.186
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.142
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.94
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.34
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.15.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38319.json"