CVE-2026-43160
Awaiting Analysis
Awaiting Analysis - Queue
Mutex Initialization Flaw in Linux Kernel macsmc Subsystem
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
In the Linux kernel, the following vulnerability has been resolved:
mfd: macsmc: Initialize mutex
Initialize struct apple_smc's mutex in apple_smc_probe(). Using the
mutex uninitialized surprisingly resulted only in occasional NULL
pointer dereferences in apple_smc_read() calls from the probe()
functions of sub devices.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the macsmc driver where a mutex in the apple_smc structure was not initialized in the apple_smc_probe() function.
Because the mutex was uninitialized, it occasionally caused NULL pointer dereferences during apple_smc_read() calls from the probe functions of sub devices.
How can this vulnerability impact me? :
The impact of this vulnerability is that it can cause occasional NULL pointer dereferences, which may lead to instability or crashes in the affected Linux kernel components interacting with the apple_smc driver.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70