[SRU][J][PATCH 0/1] CVE-2025-21780
Alice C. Munduruca
alice.munduruca at canonical.com
Wed Jan 28 17:21:39 UTC 2026
[ Impact ]
There is the possibility of a buffer overflow write when hardcoding a `pptable`
for the AMD gpu drivers through `sysfs` in malicious ways. We should check for
this case and handle it so that privilege escalation cannot be achieved.
[ Fix ]
jammy: Backported from upstream. (Sent to Ubuntu ML)
focal: Applied jammy patch to different file location. (Sent to Forgejo)
[ Tests ]
Compile and boot tested. (+stress-ng cpu, iomix)
[ Where problems could occur ]
These changes only affect users of AMD gpus, and even then only if they tend to
change driver settings through `sysfs`. This means that even if the patch
introduces the potential of a regression, it should only affect this limited subset
of Ubuntu users.
Jiang Liu (1):
drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()
drivers/gpu/drm/amd/pm/swsmu/amdgpu_smu.c | 5 ++++-
1 file changed, 4 insertions(+), 1 deletion(-)
--
2.51.0
More information about the kernel-team
mailing list