๐Ÿ” CVE Alert

CVE-2025-68190

UNKNOWN 0.0

drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked() kcalloc() may fail. When WS is non-zero and allocation fails, ectx.ws remains NULL while ectx.ws_size is set, leading to a potential NULL pointer dereference in atom_get_src_int() when accessing WS entries. Return -ENOMEM on allocation failure to avoid the NULL dereference.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 16, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d38ceaf99ed015f2a0b9af3499791bd3a3daae21 < 35f3fb86bb0158a298d6834e7e110dcaf07f490c d38ceaf99ed015f2a0b9af3499791bd3a3daae21 < 997e28d3d00a1d30649629515e4402612921205b d38ceaf99ed015f2a0b9af3499791bd3a3daae21 < cc9a8e238e42c1f43b98c097995137d644b69245
Linux / Linux
4.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/35f3fb86bb0158a298d6834e7e110dcaf07f490c git.kernel.org: https://git.kernel.org/stable/c/997e28d3d00a1d30649629515e4402612921205b git.kernel.org: https://git.kernel.org/stable/c/cc9a8e238e42c1f43b98c097995137d644b69245