Impact
A null pointer dereference in the Linux kernel’s accel/amdxdna driver occurs when a userspace process issues an ioctl to destroy a hardware context that has already been automatically suspended. Deleting the context without checking the mailbox channel pointer causes the driver to crash, leading to a kernel panic and a complete loss of system availability.
Affected Systems
The flaw is present in any Linux kernel that includes the accel/amdxdna driver before the patch is applied. Since the CPE indicates the generic linux_kernel, all distributions using the stock Linux kernel or derivatives that have not incorporated the recent commit remain vulnerable until the driver is updated.
Risk and Exploitability
The EPSS score is reported as less than 1% and the vulnerability is not listed in the CISA KEV catalog, suggesting that exploitation probability is low. Based on the description, it is inferred that an attacker would need to run code on the local machine with sufficient privileges to invoke the vulnerable ioctl, making the attack vector a local privileged user. Although the impact is a system crash, the low likelihood of public exploitation reinforces the importance of applying the fix promptly.
OpenCVE Enrichment