CVE-2026-23163
NULL Pointer Dereference in Linux amdgpu Driver Causes Kernel Crash
Publication date: 2026-02-14
Last updated on: 2026-03-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.7 (inc) to 6.12.69 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.9 (exc) |
| linux | linux_kernel | From 6.4 (inc) to 6.6.123 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's AMD GPU driver (amdgpu) specifically affecting APUs like Raven and Renoir. The issue arises because certain interrupt ring buffers (ih1 and ih2) are not initialized on these APUs by design, as these secondary rings are only available on discrete GPUs.
However, a function called amdgpu_gmc_filter_faults_remove() uses the ih1 ring buffer without checking if it is initialized, leading to a NULL pointer dereference when retry faults are enabled (noretry=0). This causes the kernel to crash with a NULL pointer dereference error.
The root cause is that the function attempts to access ih1 unconditionally, but on APUs ih1 is not set up, resulting in a crash during page fault recovery.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a NULL pointer dereference when running on affected AMD APUs with retry fault handling enabled. This results in system instability and potential denial of service as the kernel encounters a fatal error.
Such crashes can interrupt normal system operation, potentially causing data loss or requiring a system reboot.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a kernel NULL pointer dereference crash related to the amdgpu driver on affected APUs. Detection can be done by monitoring kernel logs for specific crash messages.
- Check kernel logs for the following error message indicating the NULL pointer dereference crash: "BUG: kernel NULL pointer dereference, address: 0000000000000004".
- Look for call traces involving amdgpu_ih_decode_iv_ts_helper, amdgpu_gmc_filter_faults_remove, and svm_range_restore_pages in dmesg or /var/log/kern.log.
- Use the command: dmesg | grep -i 'amdgpu_ih_decode_iv_ts_helper' to find relevant crash traces.
- Monitor for system crashes or kernel oops related to amdgpu when retry faults are enabled (noretry=0).
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, the primary step is to apply the patch that adds a check for ih1.ring_size before its usage and restores soft_ih support for hardware that does not support secondary interrupt rings.
If patching immediately is not possible, consider disabling retry fault handling by setting the kernel parameter noretry=1 for affected APUs such as Raven and Renoir, which prevents the vulnerable code path from being exercised.
- Update the Linux kernel to a version that includes the fix (cherry picked from commit 6ce8d536c80aa1f059e82184f0d1994436b1d526).
- Set the kernel boot parameter noretry=1 to disable retry fault handling temporarily.