Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-68334— platform/x86/amd/pmc: Add support for Van Gogh SoC

EPSS 0.03% · P10
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-68334

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
platform/x86/amd/pmc: Add support for Van Gogh SoC
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd/pmc: Add support for Van Gogh SoC The ROG Xbox Ally (non-X) SoC features a similar architecture to the Steam Deck. While the Steam Deck supports S3 (s2idle causes a crash), this support was dropped by the Xbox Ally which only S0ix suspend. Since the handler is missing here, this causes the device to not suspend and the AMD GPU driver to crash while trying to resume afterwards due to a power hang.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于amd/pmc驱动对Van Gogh SoC支持不足,可能导致设备无法挂起和GPU驱动崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 83cbaf14275a30f14cf558b09389a1664b173858 ~ 8af210df4f71dda74dc027da69372a028c6d4d84 -
LinuxLinux 5.14 -

II. Public POCs for CVE-2025-68334

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-68334

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-12-22 · 12 CVEs total

CVE-2025-68337jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted
CVE-2025-68336locking/spinlock/debug: Fix data-race in do_raw_write_lock
CVE-2025-68335comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel()
CVE-2025-68333sched_ext: Fix possible deadlock in the deferred_irq_workfn()
CVE-2025-68332comedi: c6xdigio: Fix invalid PNP driver unregistration
CVE-2025-68331usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transf
CVE-2025-68330iio: accel: bmc150: Fix irq assumption regression
CVE-2025-68329tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs
CVE-2025-68328firmware: stratix10-svc: fix bug in saving controller data
CVE-2025-68327usb: renesas_usbhs: Fix synchronous external abort on unbind
CVE-2025-68326drm/xe/guc: Fix stack_depot usage

IV. Related Vulnerabilities

V. Comments for CVE-2025-68334

No comments yet


Leave a comment