ACK: [SRU][J][PATCH 0/1] CVE-2025-21780

Bethany Jamison bethany.jamison at canonical.com
Wed Jan 28 20:48:49 UTC 2026


On 1/28/26 11:21 AM, Alice C. Munduruca wrote:
> [ Impact ]
>
> There is the possibility of a buffer overflow write when hardcoding a `pptable`
> for the AMD gpu drivers through `sysfs` in malicious ways. We should check for
> this case and handle it so that privilege escalation cannot be achieved.
>
> [ Fix ]
>
> jammy: Backported from upstream. (Sent to Ubuntu ML)
> focal: Applied jammy patch to different file location. (Sent to Forgejo)
>
> [ Tests ]
>
> Compile and boot tested. (+stress-ng cpu, iomix)
>
> [ Where problems could occur ]
>
> These changes only affect users of AMD gpus, and even then only if they tend to
> change driver settings through `sysfs`. This means that even if the patch
> introduces the potential of a regression, it should only affect this limited subset
> of Ubuntu users.
>
> Jiang Liu (1):
>    drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()
>
>   drivers/gpu/drm/amd/pm/swsmu/amdgpu_smu.c | 5 ++++-
>   1 file changed, 4 insertions(+), 1 deletion(-)
>
Acked-by: Bethany Jamison <bethany.jamison at canonical.com>



More information about the kernel-team mailing list