In the Linux kernel, the following vulnerability has been resolved:
drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table
The function atomctrl_initialize_mc_reg_table() and
atomctrl_initialize_mc_reg_table_v2_2() does not check the return
value of smu_atom_get_data_table(). If smu_atom_get_data_table()
fails to retrieve vram_info, it returns NULL which is later
dereferenced.
Metrics
Affected Vendors & Products
References
History
Thu, 10 Jul 2025 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table The function atomctrl_initialize_mc_reg_table() and atomctrl_initialize_mc_reg_table_v2_2() does not check the return value of smu_atom_get_data_table(). If smu_atom_get_data_table() fails to retrieve vram_info, it returns NULL which is later dereferenced. | |
Title | drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-07-10T07:42:25.111Z
Updated: 2025-07-10T07:42:25.111Z
Reserved: 2025-04-16T04:51:24.004Z
Link: CVE-2025-38319

No data.

Status : Awaiting Analysis
Published: 2025-07-10T08:15:30.940
Modified: 2025-07-10T13:17:30.017
Link: CVE-2025-38319

No data.