[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025090549-CVE-2025-39705-6ac5@gregkh>
Date: Fri, 5 Sep 2025 19:21:18 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-39705: drm/amd/display: fix a Null pointer dereference vulnerability
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: fix a Null pointer dereference vulnerability
[Why]
A null pointer dereference vulnerability exists in the AMD display driver's
(DC module) cleanup function dc_destruct().
When display control context (dc->ctx) construction fails
(due to memory allocation failure), this pointer remains NULL.
During subsequent error handling when dc_destruct() is called,
there's no NULL check before dereferencing the perf_trace member
(dc->ctx->perf_trace), causing a kernel null pointer dereference crash.
[How]
Check if dc->ctx is non-NULL before dereferencing.
(Updated commit text and removed unnecessary error message)
(cherry picked from commit 9dd8e2ba268c636c240a918e0a31e6feaee19404)
The Linux kernel CVE team has assigned CVE-2025-39705 to this issue.
Affected and fixed versions
===========================
Fixed in 6.12.44 with commit 0961673cc5f0055957aa46f25eb4ef6c07e00165
Fixed in 6.16.4 with commit 4ade995b9b25b3c6e8dc42c27070340f1358d8c8
Fixed in 6.17-rc1 with commit 1bcf63a44381691d6192872801f830ce3250e367
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-39705
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/gpu/drm/amd/display/dc/core/dc.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/0961673cc5f0055957aa46f25eb4ef6c07e00165
https://git.kernel.org/stable/c/4ade995b9b25b3c6e8dc42c27070340f1358d8c8
https://git.kernel.org/stable/c/1bcf63a44381691d6192872801f830ce3250e367
Powered by blists - more mailing lists