Impact
The dw-dp driver for Synopsys devices in the Linux kernel handles errors during the binding of DRM bridges incorrectly. When drm_bridge_attach() or other functions fail, the driver continues executing instead of returning, causing undefined states. Also, the non‑devm auxiliary registration isn’t rolled back on failure, leaking resources, and an incorrect error conversion can hide negative return codes. These mistakes can lead to a kernel panic or loss of display functionality, which effectively constitutes a denial‑of‑service.
Affected Systems
Systems running any Linux kernel release that contains the dw_dp_bind implementation before the fix—specifically kernel 6.19 RC1 through RC6 and any earlier stable branches that omit the patch—are affected. The problem exists in the generic Linux kernel code and therefore applies to all distributions shipping those kernel versions.
Risk and Exploitability
The CVSS score is 5.5, with an EPSS score of less than 1%, indicating a low but non‑zero likelihood of exploitation, and it is not currently listed in CISA’s KEV catalog. Based on the description, it is inferred that an attacker would need local privileges with access to the DRM subsystem to trigger the faulty error handling. No public exploit has been reported, but an adversary could cause a crash by attempting to bind the driver with manipulated parameters, thereby disrupting system availability.
OpenCVE Enrichment