CVE-2025-68190

Source
https://cve.org/CVERecord?id=CVE-2025-68190
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68190.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-68190
Downstream
Related
Published
2025-12-16T13:43:12.297Z
Modified
2026-03-12T04:29:47.002075Z
Summary
drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked()
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpuatomexecutetablelocked()

kcalloc() may fail. When WS is non-zero and allocation fails, ectx.ws remains NULL while ectx.wssize is set, leading to a potential NULL pointer dereference in atomgetsrcint() when accessing WS entries.

Return -ENOMEM on allocation failure to avoid the NULL dereference.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68190.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Fixed
35f3fb86bb0158a298d6834e7e110dcaf07f490c
Fixed
997e28d3d00a1d30649629515e4402612921205b
Fixed
cc9a8e238e42c1f43b98c097995137d644b69245

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68190.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.2.0
Fixed
6.12.58
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68190.json"