[SRU][J][PATCH 0/1] CVE-2025-21780

Alice C. Munduruca alice.munduruca at canonical.com
Wed Jan 28 17:21:39 UTC 2026


[ Impact ]

There is the possibility of a buffer overflow write when hardcoding a `pptable`
for the AMD gpu drivers through `sysfs` in malicious ways. We should check for
this case and handle it so that privilege escalation cannot be achieved.

[ Fix ]

jammy: Backported from upstream. (Sent to Ubuntu ML)
focal: Applied jammy patch to different file location. (Sent to Forgejo)

[ Tests ]

Compile and boot tested. (+stress-ng cpu, iomix)

[ Where problems could occur ]

These changes only affect users of AMD gpus, and even then only if they tend to
change driver settings through `sysfs`. This means that even if the patch
introduces the potential of a regression, it should only affect this limited subset
of Ubuntu users.

Jiang Liu (1):
  drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()

 drivers/gpu/drm/amd/pm/swsmu/amdgpu_smu.c | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

-- 
2.51.0




More information about the kernel-team mailing list