SB20250509137 - Buffer overflow in Linux kernel amd pds_core driver
Published: May 9, 2025 Updated: May 10, 2025
Security Bulletin ID
SB20250509137
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Local access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2025-37886)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the pdsc_q_map() function in drivers/net/ethernet/amd/pds_core/core.c, within the pdsc_process_notifyq(), pdsc_process_adminq(), pdsc_adminq_isr(), __pdsc_adminq_post() and pdsc_adminq_post() functions in drivers/net/ethernet/amd/pds_core/adminq.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/1d7c4b2b0bbfb09b55b2dc0e2355d7936bf89381
- https://git.kernel.org/stable/c/3f77c3dfffc7063428b100c4945ca2a7a8680380
- https://git.kernel.org/stable/c/520f012fe75fb8efc9f16a57ef929a7a2115d892
- https://git.kernel.org/stable/c/66d7702b42ffdf0dce4808626088268a4e905ca6
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.26