Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2025-21780 First vendor Publication 2025-02-27
Vendor Cve Last vendor Modification 2025-03-05

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()

It malicious user provides a small pptable through sysfs and then a bigger pptable, it may cause buffer overflow attack in function smu_sys_set_pp_table().

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21780

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3713

Sources (Detail)

https://git.kernel.org/stable/c/1abb2648698bf10783d2236a6b4a7ca5e8021699
https://git.kernel.org/stable/c/231075c5a8ea54f34b7c4794687baa980814e6de
https://git.kernel.org/stable/c/2498d2db1d35e88a2060ea191ae75dce853dd084
https://git.kernel.org/stable/c/3484ea33157bc7334f57e64826ec5a4bf992151a
https://git.kernel.org/stable/c/e43a8b9c4d700ffec819c5043a48769b3e7d9cab
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Date Informations
2025-06-26 02:40:59
  • Multiple Updates
2025-06-25 12:38:02
  • Multiple Updates
2025-06-24 02:45:26
  • Multiple Updates
2025-05-27 02:52:27
  • Multiple Updates
2025-03-29 03:46:31
  • Multiple Updates
2025-03-28 13:49:01
  • Multiple Updates
2025-03-28 03:24:22
  • Multiple Updates
2025-03-25 16:30:09
  • Multiple Updates
2025-03-25 03:30:10
  • Multiple Updates
2025-03-19 03:18:42
  • Multiple Updates
2025-03-18 03:31:40
  • Multiple Updates
2025-03-14 00:21:03
  • Multiple Updates
2025-03-13 21:20:57
  • Multiple Updates
2025-03-13 17:20:51
  • Multiple Updates
2025-02-27 09:20:31
  • First insertion