In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Add basic validation for RAS header
If RAS header read from EEPROM is corrupted, it could result in trying
to allocate huge memory for reading the records. Add some validation to
header fields.
Metrics
Affected Vendors & Products
References
History
Thu, 14 Aug 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Sat, 26 Jul 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Vendors & Products |
Linux
Linux linux Kernel |
Fri, 25 Jul 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Add basic validation for RAS header If RAS header read from EEPROM is corrupted, it could result in trying to allocate huge memory for reading the records. Add some validation to header fields. | |
Title | drm/amdgpu: Add basic validation for RAS header | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-07-25T14:16:46.482Z
Updated: 2025-07-28T11:16:57.653Z
Reserved: 2025-04-16T04:51:24.015Z
Link: CVE-2025-38426

No data.

Status : Awaiting Analysis
Published: 2025-07-25T15:15:27.510
Modified: 2025-07-25T15:29:19.837
Link: CVE-2025-38426
