CVE-2026-43335
Received Received - Intake
NULL Pointer Dereference in Linux Kernel Interconnect Driver

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: interconnect: qcom: sm8450: Fix NULL pointer dereference in icc_link_nodes() The change to dynamic IDs for SM8450 platform interconnects left two links unconverted, fix it to avoid the NULL pointer dereference in runtime, when a pointer to a destination interconnect is not valid: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008 <...> Call trace: icc_link_nodes+0x3c/0x100 (P) qcom_icc_rpmh_probe+0x1b4/0x528 platform_probe+0x64/0xc0 really_probe+0xc4/0x2a8 __driver_probe_device+0x80/0x140 driver_probe_device+0x48/0x170 __device_attach_driver+0xc0/0x148 bus_for_each_drv+0x88/0xf0 __device_attach+0xb0/0x1c0 device_initial_probe+0x58/0x68 bus_probe_device+0x40/0xb8 deferred_probe_work_func+0x90/0xd0 process_one_work+0x15c/0x3c0 worker_thread+0x2e8/0x400 kthread+0x150/0x208 ret_from_fork+0x10/0x20 Code: 900310f4 911d6294 91008280 94176078 (f94002a0) ---[ end trace 0000000000000000 ]--- Kernel panic - not syncing: Oops: Fatal exception
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
qualcomm sm8450 *
qcom sm8450 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a NULL pointer dereference in the Linux kernel specifically affecting the Qualcomm SM8450 platform interconnect driver. The issue arises because two interconnect links were not properly converted to use dynamic IDs, leading to a situation where a pointer to a destination interconnect is invalid (NULL) during runtime. When the kernel tries to access this invalid pointer, it causes a NULL pointer dereference, which can lead to a kernel panic and system crash.


How can this vulnerability impact me? :

This vulnerability can cause the affected system to experience a kernel panic due to a NULL pointer dereference. This results in a fatal exception that crashes the kernel, leading to system instability or downtime. For users or administrators, this means potential loss of service, data corruption, or the need for a system reboot to recover from the crash.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability manifests as a NULL pointer dereference in the Linux kernel on the Qualcomm SM8450 platform, causing kernel panic and fatal exceptions.

Detection would involve monitoring kernel logs for messages indicating a NULL pointer dereference related to icc_link_nodes or qcom_icc_rpmh_probe, such as kernel oops or panic traces.

You can check the kernel logs using commands like:

  • dmesg | grep -i 'NULL pointer dereference'
  • journalctl -k | grep -i 'icc_link_nodes'
  • journalctl -k | grep -i 'qcom_icc_rpmh_probe'

Additionally, monitoring for kernel panics or oops events related to interconnect drivers on SM8450 devices can help detect this issue.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability has been fixed by correcting the NULL pointer dereference in the icc_link_nodes function for the SM8450 platform interconnects.

Immediate mitigation steps include:

  • Update the Linux kernel on affected SM8450 devices to a version that includes the fix for this vulnerability.
  • Avoid running untrusted or unverified kernel modules or drivers that interact with the Qualcomm interconnect subsystem.
  • Monitor system stability and kernel logs for signs of the issue until the update can be applied.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart