
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in the Linux kernel's Radeon graphics driver, specifically in the radeonvcecs_parse() function. The issue was identified and disclosed on April 3, 2025, affecting the command stream parsing functionality in the DRM/Radeon subsystem. The vulnerability was discovered by the Linux Verification Center using their static analysis tool SVACE (NVD).
The vulnerability stems from an uninitialized size variable issue in the radeonvcecsparse() function. When a specially crafted command stream is passed from userspace via an ioctl() call, and the first command is set to encode (case 0x03000001), the function attempts to call radeonvcecsreloc() with an uninitialized size argument. Specifically, the 'size' parameter points to a 'tmp' variable before it has been properly initialized (NVD).
The vulnerability could potentially lead to security implications when processing command streams in the Radeon graphics driver. The issue affects systems running the Linux kernel with Radeon graphics hardware (NVD).
The vulnerability has been patched by initializing the 'tmp' variable with 0, ensuring that radeonvcecs_reloc() will catch an early error in cases where malformed command streams are processed. The fix has been incorporated into the Linux kernel, and updated versions are available through distribution channels (NVD, Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."