CVE-2026-43367
Received Received - Intake
NULL Pointer Dereference in AMD GPU Linux Kernel Driver

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd: Fix a few more NULL pointer dereference in device cleanup I found a few more paths that cleanup fails due to a NULL version pointer on unsupported hardware. Add NULL checks as applicable. (cherry picked from commit f5a05f8414fc10f307eb965f303580c7778f8dd2)
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is related to the Linux kernel's AMD DRM (Direct Rendering Manager) component. It involves NULL pointer dereferences occurring during device cleanup on unsupported hardware due to missing NULL checks on a version pointer.

The issue was that some cleanup paths failed because the version pointer was NULL, which could cause the kernel to dereference a NULL pointer, potentially leading to crashes or instability.

The fix involved adding appropriate NULL checks to prevent these dereferences.


How can this vulnerability impact me? :

This vulnerability can cause the Linux kernel to crash or become unstable when cleaning up AMD DRM devices on unsupported hardware due to NULL pointer dereferences.

Such crashes can lead to system downtime, loss of data in memory, or degraded system reliability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart