Description
In the Linux kernel, the following vulnerability has been resolved:

arm_mpam: Fix null pointer dereference when restoring bandwidth counters

When an MSC supporting memory bandwidth monitoring is brought offline and
then online, mpam_restore_mbwu_state() calls __ris_msmon_read() via ipi to
restore the configuration of the bandwidth counters. It doesn't care about
the value read, mbwu_arg.val, and doesn't set it leading to a null pointer
dereference when __ris_msmon_read() adds to it. This results in a kernel
oops with a call trace such as:

Call trace:
__ris_msmon_read+0x19c/0x64c (P)
mpam_restore_mbwu_state+0xa0/0xe8
smp_call_on_cpu_callback+0x1c/0x38
process_one_work+0x154/0x4b4
worker_thread+0x188/0x310
kthread+0x11c/0x130
ret_from_fork+0x10/0x20

Provide a local variable for val to avoid __ris_msmon_read() dereferencing
a null pointer when adding to val.
Published: 2026-04-03
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Kernel crash leading to availability disruption
Action: Patch
AI Analysis

Impact

A null pointer dereference occurs in the Linux kernel when restoring memory bandwidth counter state on systems that support the ARM MPAM feature. The bug manifests as a kernel oops and a call trace referencing __ris_msmon_read and mpam_restore_mbwu_state. The failure results in a sudden interruption of kernel operations and, consequently, a denial of service to the affected system. Based on the description, it is inferred that the vulnerability requires local execution or privileged manipulation of kernel state; there is no evidence of a remote attack vector.

Affected Systems

The affected systems are Linux kernel installations that include support for ARM Multi‑Policy Adaptive Memory (MPAM). In particular, any kernel version that implements mpam_restore_mbwu_state and __ris_msmon_read without the local val variable patch is vulnerable. The specific kernel releases are not enumerated in the available data, so all unpatched ARM kernel builds should be considered at risk.

Risk and Exploitability

The CVSS score is not provided, but the impact is a kernel crash, which can be classified as high severity for availability. The EPSS score is not available and the vulnerability is not listed in CISA's KEV catalog, suggesting limited known exploitation. Attackers would need locality or elevated privileges to force the problematic state transition, making exploitation more difficult. Nevertheless, the risk remains significant for systems that rely on continuous operation, as an unpatched kernel could be forced into a crash through manipulation of memory bandwidth monitoring.

Generated by OpenCVE AI on April 3, 2026 at 18:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify that the running kernel includes the patch that introduces a local variable for mbwu_arg.val during MPAM restore.

Generated by OpenCVE AI on April 3, 2026 at 18:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 04 Apr 2026 01:15:00 +0000


Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: arm_mpam: Fix null pointer dereference when restoring bandwidth counters When an MSC supporting memory bandwidth monitoring is brought offline and then online, mpam_restore_mbwu_state() calls __ris_msmon_read() via ipi to restore the configuration of the bandwidth counters. It doesn't care about the value read, mbwu_arg.val, and doesn't set it leading to a null pointer dereference when __ris_msmon_read() adds to it. This results in a kernel oops with a call trace such as: Call trace: __ris_msmon_read+0x19c/0x64c (P) mpam_restore_mbwu_state+0xa0/0xe8 smp_call_on_cpu_callback+0x1c/0x38 process_one_work+0x154/0x4b4 worker_thread+0x188/0x310 kthread+0x11c/0x130 ret_from_fork+0x10/0x20 Provide a local variable for val to avoid __ris_msmon_read() dereferencing a null pointer when adding to val.
Title arm_mpam: Fix null pointer dereference when restoring bandwidth counters
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T15:15:18.757Z

Reserved: 2026-01-13T15:37:46.016Z

Link: CVE-2026-23433

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-03T16:16:24.777

Modified: 2026-04-03T16:16:24.777

Link: CVE-2026-23433

cve-icon Redhat

Severity :

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23433 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:16:18Z

Weaknesses