CVE-2026-43160
Awaiting Analysis Awaiting Analysis - Queue
Mutex Initialization Flaw in Linux Kernel macsmc Subsystem

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: mfd: macsmc: Initialize mutex Initialize struct apple_smc's mutex in apple_smc_probe(). Using the mutex uninitialized surprisingly resulted only in occasional NULL pointer dereferences in apple_smc_read() calls from the probe() functions of sub devices.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel involves the macsmc driver where a mutex in the apple_smc structure was not initialized in the apple_smc_probe() function.

Because the mutex was uninitialized, it occasionally caused NULL pointer dereferences during apple_smc_read() calls from the probe functions of sub devices.


How can this vulnerability impact me? :

The impact of this vulnerability is that it can cause occasional NULL pointer dereferences, which may lead to instability or crashes in the affected Linux kernel components interacting with the apple_smc driver.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart