-
CVE-2025-68190
- EPSS 0.02%
- Veröffentlicht 16.12.2025 13:43:12
- Zuletzt bearbeitet 18.12.2025 15:08:25
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked() kcalloc() may fail. When WS is non-zero and allocation fails, ectx.ws remains NULL while ectx.ws_size is set, leading to a potential NULL pointer dereference in atom_get_src_int() when accessing WS entries. Return -ENOMEM on allocation failure to avoid the NULL dereference.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
35f3fb86bb0158a298d6834e7e110dcaf07f490c
Version
d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status
affected
Version <
997e28d3d00a1d30649629515e4402612921205b
Version
d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status
affected
Version <
cc9a8e238e42c1f43b98c097995137d644b69245
Version
d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.2
Status
affected
Version <
4.2
Version
0
Status
unaffected
Version <=
6.12.*
Version
6.12.58
Status
unaffected
Version <=
6.17.*
Version
6.17.8
Status
unaffected
Version <=
*
Version
6.18
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.057 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|