Impact
This vulnerability arises in the AMDGPU driver of the Linux kernel, where an uninitialized pointer to a structure referred to as the hive could be dereferenced during error handling after a slot reset. The result is access to an uninitialized list, potentially leading to a kernel crash or undefined kernel behavior. The primary consequence of exploitation is a denial of service on the affected system, as the kernel may abort when the erroneous list is accessed.
Affected Systems
The flaw affects systems running the Linux kernel when the AMDGPU DRM driver is in use. No specific kernel version ranges are listed, so any kernel that includes the vulnerable code path prior to the applied fix is potentially impacted.
Risk and Exploitability
The EPSS score is reported as below 1 % and the vulnerability is not present in the CISA KEV catalog, indicating a low likelihood of widespread exploitation. The fix addresses uninitialized data handling, so exploitation would require triggering a slot reset failure. It is inferred that an attacker would need local access to a machine with an AMDGPU device and the ability to invoke the reset operation. With the low EPSS and absence from KEV, the overall risk is considered moderate, primarily limited to local or compromised environments.
OpenCVE Enrichment