APPLIED: [SRU][J][PATCH 0/1] CVE-2025-21780

Edoardo Canepa edoardo.canepa at canonical.com
Thu Feb 5 11:40:29 UTC 2026


Applied to jammy:linux/master-next. Thanks.

On 1/28/26 18:21, Alice C. Munduruca wrote:
> [ Impact ]
>
> There is the possibility of a buffer overflow write when hardcoding a `pptable`
> for the AMD gpu drivers through `sysfs` in malicious ways. We should check for
> this case and handle it so that privilege escalation cannot be achieved.
>
> [ Fix ]
>
> jammy: Backported from upstream. (Sent to Ubuntu ML)
> focal: Applied jammy patch to different file location. (Sent to Forgejo)
>
> [ Tests ]
>
> Compile and boot tested. (+stress-ng cpu, iomix)
>
> [ Where problems could occur ]
>
> These changes only affect users of AMD gpus, and even then only if they tend to
> change driver settings through `sysfs`. This means that even if the patch
> introduces the potential of a regression, it should only affect this limited subset
> of Ubuntu users.
>
> Jiang Liu (1):
>    drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()
>
>   drivers/gpu/drm/amd/pm/swsmu/amdgpu_smu.c | 5 ++++-
>   1 file changed, 4 insertions(+), 1 deletion(-)
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0x20F88172E14F6784.asc
Type: application/pgp-keys
Size: 3167 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20260205/73c8e332/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20260205/73c8e332/attachment.sig>


More information about the kernel-team mailing list