{"uuid": "0c38cb03-722b-4ea9-8e67-4a745e94977a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38080", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18701", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-38080\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Increase block_sequence array size\n\n[Why]\nIt's possible to generate more than 50 steps in hwss_build_fast_sequence,\nfor example with a 6-pipe asic where all pipes are in one MPC chain. This\noverflows the block_sequence buffer and corrupts block_sequence_steps,\ncausing a crash.\n\n[How]\nExpand block_sequence to 100 items. A naive upper bound on the possible\nnumber of steps for a 6-pipe asic, ignoring the potential for steps to be\nmutually exclusive, is 91 with current code, therefore 100 is sufficient.\n\ud83d\udccf Published: 2025-06-18T09:33:53.920Z\n\ud83d\udccf Modified: 2025-06-18T09:33:53.920Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/de67e80ab48f1f23663831007a2fa3c1471a7757\n2. https://git.kernel.org/stable/c/e55c5704b12eeea27e212bfab8f7e51ad3e8ac1f\n3. https://git.kernel.org/stable/c/bf1666072e7482317cf2302621766482a21a62c7\n4. https://git.kernel.org/stable/c/3a7810c212bcf2f722671dadf4b23ff70a7d23ee", "creation_timestamp": "2025-06-18T10:39:59.000000Z"}