Описание
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Add basic validation for RAS header
If RAS header read from EEPROM is corrupted, it could result in trying to allocate huge memory for reading the records. Add some validation to header fields.
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Add basic validation for RAS header
If RAS header read from EEPROM is corrupted, it could result in trying to allocate huge memory for reading the records. Add some validation to header fields.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-38426
- https://git.kernel.org/stable/c/0479268fdfaaff6e15d69e8a8387410f36d1b793
- https://git.kernel.org/stable/c/5df0d6addb7e9b6f71f7162d1253762a5be9138e
- https://git.kernel.org/stable/c/b52f52bc5ba9feb026c0be600f8ac584fd12d187
- https://git.kernel.org/stable/c/e1903358b2152f5d64a83e796bb776aba0d3628d
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Add basic validation for RAS header If RAS header read from EEPROM is corrupted, it could result in trying to allocate huge memory for reading the records. Add some validation to header fields.
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Add basic validation for RAS header If RAS header read from EEPROM is corrupted, it could result in trying to allocate huge memory for reading the records. Add some validation to header fields.
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Add basic validation for RAS header If RAS header read from EEPROM is corrupted, it could result in trying to allocate huge memory for reading the records. Add some validation to header fields.
In the Linux kernel, the following vulnerability has been resolved: d ...