CVE-2025-21780
drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() It malicious user provides a small pptable through sysfs and then a bigger pptable, it may cause buffer overflow attack in function smu_sys_set_pp_table().
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Feb 27, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new high vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
137d63abbf6a0859e79b662e81d21170ecb75e59 < 3484ea33157bc7334f57e64826ec5a4bf992151a 137d63abbf6a0859e79b662e81d21170ecb75e59 < e43a8b9c4d700ffec819c5043a48769b3e7d9cab 137d63abbf6a0859e79b662e81d21170ecb75e59 < 2498d2db1d35e88a2060ea191ae75dce853dd084 137d63abbf6a0859e79b662e81d21170ecb75e59 < 231075c5a8ea54f34b7c4794687baa980814e6de 137d63abbf6a0859e79b662e81d21170ecb75e59 < 1abb2648698bf10783d2236a6b4a7ca5e8021699
Linux / Linux
5.2
References
git.kernel.org: https://git.kernel.org/stable/c/3484ea33157bc7334f57e64826ec5a4bf992151a git.kernel.org: https://git.kernel.org/stable/c/e43a8b9c4d700ffec819c5043a48769b3e7d9cab git.kernel.org: https://git.kernel.org/stable/c/2498d2db1d35e88a2060ea191ae75dce853dd084 git.kernel.org: https://git.kernel.org/stable/c/231075c5a8ea54f34b7c4794687baa980814e6de git.kernel.org: https://git.kernel.org/stable/c/1abb2648698bf10783d2236a6b4a7ca5e8021699 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html