In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()
It malicious user provides a small pptable through sysfs and then
a bigger pptable, it may cause buffer overflow attack in function
smu_sys_set_pp_table().
Metrics
Affected Vendors & Products
References
History
Mon, 17 Mar 2025 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 12 Mar 2025 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-120 |
Fri, 28 Feb 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 27 Feb 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() It malicious user provides a small pptable through sysfs and then a bigger pptable, it may cause buffer overflow attack in function smu_sys_set_pp_table(). | |
Title | drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-02-27T02:18:23.543Z
Updated: 2025-03-24T15:40:17.324Z
Reserved: 2024-12-29T08:45:45.764Z
Link: CVE-2025-21780

No data.

Status : Received
Published: 2025-02-27T03:15:18.827
Modified: 2025-02-27T03:15:18.827
Link: CVE-2025-21780
