We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38426

drm/amdgpu: Add basic validation for RAS header



Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Add basic validation for RAS header If RAS header read from EEPROM is corrupted, it could result in trying to allocate huge memory for reading the records. Add some validation to header fields.

Reserved 2025-04-16 | Published 2025-07-25 | Updated 2025-07-25 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before b52f52bc5ba9feb026c0be600f8ac584fd12d187
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 5df0d6addb7e9b6f71f7162d1253762a5be9138e
affected

Default status
affected

6.15.4
unaffected

6.16-rc1
unaffected

References

git.kernel.org/...c/b52f52bc5ba9feb026c0be600f8ac584fd12d187

git.kernel.org/...c/5df0d6addb7e9b6f71f7162d1253762a5be9138e

cve.org (CVE-2025-38426)

nvd.nist.gov (CVE-2025-38426)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38426

Support options

Helpdesk Chat, Email, Knowledgebase