CVE-2025-38319
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-10

Last updated on: 2025-11-03

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table The function atomctrl_initialize_mc_reg_table() and atomctrl_initialize_mc_reg_table_v2_2() does not check the return value of smu_atom_get_data_table(). If smu_atom_get_data_table() fails to retrieve vram_info, it returns NULL which is later dereferenced.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-10
Last Modified
2025-11-03
Generated
2026-05-07
AI Q&A
2025-07-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in the Linux kernel's AMD DRM driver where the functions atomctrl_initialize_mc_reg_table() and atomctrl_initialize_mc_reg_table_v2_2() do not properly check if the function smu_atom_get_data_table() returns NULL. If smu_atom_get_data_table() fails to retrieve the vram_info data and returns NULL, the code later dereferences this NULL pointer, which can cause a kernel crash or other unintended behavior.


How can this vulnerability impact me? :

The impact of this vulnerability is a potential NULL pointer dereference in the Linux kernel, which can lead to a kernel crash (denial of service) or system instability when the affected functions attempt to use a NULL pointer. This could disrupt normal system operations and potentially be exploited to cause a denial of service.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart