CVE-2026-43337
NULL Pointer Dereference in AMD Display Driver
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not include any details about the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's AMD display driver code, specifically in the function dcn401_init_hw(). The function assumes that a callback function update_bw_bounding_box() is valid when entering an update path. However, due to a logical condition, the code can call update_bw_bounding_box() even when it is NULL, leading to a NULL pointer dereference.
The issue arises because the condition that controls the call does not guarantee the callback pointer is valid, especially when the freq_changed branch evaluates to true independently of the callback pointer. This can cause the system to attempt to execute a NULL function pointer.
The fix involves separating the update condition from the pointer checks and validating the callback, clock manager, and bandwidth parameters before use to prevent the NULL pointer dereference.
How can this vulnerability impact me? :
This vulnerability can cause a NULL pointer dereference in the Linux kernel's AMD display driver, which may lead to system instability or crashes. When the system attempts to call a NULL function pointer, it can result in a kernel panic or other unexpected behavior, potentially causing denial of service.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability in the Linux kernel related to drm/amd/display's dcn401_init_hw() function has been fixed by ensuring proper validation of the callback pointer and related parameters before use.
To mitigate this vulnerability immediately, you should update your Linux kernel to a version that includes the fix for this issue.