VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68190

CVE-2025-68190

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked()

kcalloc() may fail. When WS is non-zero and allocation fails, ectx.ws remains NULL while ectx.ws_size is set, leading to a potential NULL pointer dereference in atom_get_src_int() when accessing WS entries.

Return -ENOMEM on allocation failure to avoid the NULL dereference.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, a missing kcalloc() failure check in amdgpu_atom_execute_table_locked() can lead to a NULL pointer dereference.

Vulnerability

Analysis

In the Linux kernel's AMDGPU driver, the function amdgpu_atom_execute_table_locked() uses kcalloc() to allocate a workspace (WS) buffer when the WS size is non-zero. The vulnerability arises because the return value of kcalloc() is not checked for failure. If the allocation fails, ectx.ws remains NULL while ectx.ws_size is set to the requested size, leading to a potential NULL pointer dereference in atom_get_src_int() when it accesses WS entries [1].

Exploitation

The attack surface is local, requiring the ability to trigger a memory allocation failure in a specific code path of the AMDGPU driver. No special privileges are mentioned; however, the user would need to have access to DRM operations that invoke the atom execution table, which typically requires a logged-in user with GPU access. The exploitation scenario involves an out-of-memory condition or a crafted environment that causes kcalloc() to fail, after which a subsequent operation dereferences the NULL ectx.ws pointer [1].

Impact

A successful exploit could lead to a NULL pointer dereference, which in the kernel context results in a denial of service (system crash or hang). The impact is limited to availability, as the vulnerability does not provide code execution or privilege escalation according to the patch description [1].

Mitigation

The vulnerability is fixed by adding a check for the return value of kcalloc() and returning -ENOMEM if the allocation fails. The patch is included in the Linux kernel stable tree as commit cc9a8e238e42. Users should update their kernel to a version containing this fix [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.