ACK: [SRU][J][PATCH 0/1] CVE-2025-21780

Benjamin Wheeler benjamin.wheeler at canonical.com
Thu Jan 29 17:11:51 UTC 2026


Acked-by: Benjamin Wheeler <benjamin.wheeler at canonical.com>

On Wed, Jan 28, 2026 at 12:22 PM Alice C. Munduruca <
alice.munduruca at canonical.com> wrote:

> [ Impact ]
>
> There is the possibility of a buffer overflow write when hardcoding a
> `pptable`
> for the AMD gpu drivers through `sysfs` in malicious ways. We should check
> for
> this case and handle it so that privilege escalation cannot be achieved.
>
> [ Fix ]
>
> jammy: Backported from upstream. (Sent to Ubuntu ML)
> focal: Applied jammy patch to different file location. (Sent to Forgejo)
>
> [ Tests ]
>
> Compile and boot tested. (+stress-ng cpu, iomix)
>
> [ Where problems could occur ]
>
> These changes only affect users of AMD gpus, and even then only if they
> tend to
> change driver settings through `sysfs`. This means that even if the patch
> introduces the potential of a regression, it should only affect this
> limited subset
> of Ubuntu users.
>
> Jiang Liu (1):
>   drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()
>
>  drivers/gpu/drm/amd/pm/swsmu/amdgpu_smu.c | 5 ++++-
>  1 file changed, 4 insertions(+), 1 deletion(-)
>
> --
> 2.51.0
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20260129/e683d385/attachment.html>


More information about the kernel-team mailing list