CVE-2026-43335
NULL Pointer Dereference in Linux Kernel Interconnect Driver
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qualcomm | sm8450 | * |
| qcom | sm8450 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel specifically affecting the Qualcomm SM8450 platform interconnect driver. The issue arises because two interconnect links were not properly converted to use dynamic IDs, leading to a situation where a pointer to a destination interconnect is invalid (NULL) during runtime. When the kernel tries to access this invalid pointer, it causes a NULL pointer dereference, which can lead to a kernel panic and system crash.
How can this vulnerability impact me? :
This vulnerability can cause the affected system to experience a kernel panic due to a NULL pointer dereference. This results in a fatal exception that crashes the kernel, leading to system instability or downtime. For users or administrators, this means potential loss of service, data corruption, or the need for a system reboot to recover from the crash.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a NULL pointer dereference in the Linux kernel on the Qualcomm SM8450 platform, causing kernel panic and fatal exceptions.
Detection would involve monitoring kernel logs for messages indicating a NULL pointer dereference related to icc_link_nodes or qcom_icc_rpmh_probe, such as kernel oops or panic traces.
You can check the kernel logs using commands like:
- dmesg | grep -i 'NULL pointer dereference'
- journalctl -k | grep -i 'icc_link_nodes'
- journalctl -k | grep -i 'qcom_icc_rpmh_probe'
Additionally, monitoring for kernel panics or oops events related to interconnect drivers on SM8450 devices can help detect this issue.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been fixed by correcting the NULL pointer dereference in the icc_link_nodes function for the SM8450 platform interconnects.
Immediate mitigation steps include:
- Update the Linux kernel on affected SM8450 devices to a version that includes the fix for this vulnerability.
- Avoid running untrusted or unverified kernel modules or drivers that interact with the Qualcomm interconnect subsystem.
- Monitor system stability and kernel logs for signs of the issue until the update can be applied.