### [CVE-2025-38362](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38362) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=2deade5ede56581722c0d7672f28b09548dc0fc4%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.8%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Add null pointer check for get_first_active_display()The function mod_hdcp_hdcp1_enable_encryption() calls the functionget_first_active_display(), but does not check its return value.The return value is a null pointer if the display list is empty.This will lead to a null pointer dereference inmod_hdcp_hdcp2_enable_encryption().Add a null pointer check for get_first_active_display() and returnMOD_HDCP_STATUS_DISPLAY_NOT_FOUND if the function return null. ### POC #### Reference No PoCs from references. #### Github - https://github.com/w4zu/Debian_security