CVE-2025-38080

Source
https://cve.org/CVERecord?id=CVE-2025-38080
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38080.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38080
Downstream
Related
Published
2025-06-18T09:33:53.920Z
Modified
2026-03-20T12:42:39.917325Z
Summary
drm/amd/display: Increase block_sequence array size
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Increase block_sequence array size

[Why] It's possible to generate more than 50 steps in hwssbuildfastsequence, for example with a 6-pipe asic where all pipes are in one MPC chain. This overflows the blocksequence buffer and corrupts blocksequencesteps, causing a crash.

[How] Expand block_sequence to 100 items. A naive upper bound on the possible number of steps for a 6-pipe asic, ignoring the potential for steps to be mutually exclusive, is 91 with current code, therefore 100 is sufficient.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38080.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c
Fixed
de67e80ab48f1f23663831007a2fa3c1471a7757
Fixed
e55c5704b12eeea27e212bfab8f7e51ad3e8ac1f
Fixed
bf1666072e7482317cf2302621766482a21a62c7
Fixed
3a7810c212bcf2f722671dadf4b23ff70a7d23ee

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38080.json"