VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68196

CVE-2025-68196

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Cache streams targeting link when performing LT automation

[WHY] Last LT automation update can cause crash by referencing current_state and calling into dc_update_planes_and_stream which may clobber current_state.

[HOW] Cache relevant stream pointers and iterate through them instead of relying on the current_state.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, a use-after-free crash in the AMD GPU display driver occurs when LT automation dereferences a clobbered current_state pointer.

A use-after-free vulnerability exists in the Linux kernel's AMD GPU display driver (drm/amd/display). The issue arises during Link Training (LT) automation, where the driver caches a pointer to current_state and later calls dc_update_planes_and_stream. This call, which may free and reallocate current_state`, leaving the cached pointer dangling. [1]

To exploit this vulnerability, an attacker must have the ability to trigger LT automation operations on a system with an AMD GPU—typically requiring local access or the ability to influence display configuration. No special privileges are needed beyond normal user access to DRM interfaces. [1]

The impact is a kernel crash (denial of service) due to use of a freed pointer. In the worst case, this could potentially be leveraged for privilege escalation or arbitrary code execution, though that remains speculative based on the available information. [1]

The fix, committed to the Linux kernel stable tree, caches the relevant stream pointers before calling dc_update_planes_and_stream call, avoiding the race condition. System administrators should be applied to any affected kernel versions. [1]

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.