Impact
The vulnerability originates from a NULL pointer dereference in the Intel DMC update routine during system probe. When the Display Power Management (DC6) state is enabled before the Dynamic Memory Controller is initialized, the routine accesses a NULL pointer and triggers a kernel oops. This results in a system crash and loss of availability for the affected commodity. The weakness is classified as CWE‑476.
Affected Systems
The flaw affects Linux kernel builds that include the i915 graphics driver and support Intel CPUs such as Skylake, Broxton and Ice Lake. Any system that boots with the DMC firmware enabled before the display power domains are initialized is vulnerable. The specific kernel versions prior to the patch are not listed in the data, but kernel updates prior to the inclusion of the fix carry the risk.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score is not available, so the likelihood of exploitation is uncertain. Because the fault occurs only when DC6 is enabled at boot—a rare state caused by BIOS or firmware misconfiguration—the attack vector is unlikely and would likely require local or privileged access to the machine. The vulnerability does not enable code execution; it only causes a crash, so it is not listed in the CISA KEV catalog.
OpenCVE Enrichment