Description
In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: check if ext_caps is valid in BL setup

LVDS connectors don't have extended backlight caps so check
if the pointer is valid before accessing it.

(cherry picked from commit 3f797396d7f4eb9bb6eded184bbc6f033628a6f6)
Published: 2026-04-22
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw in the AMD DRM display subsystem allows a null pointer dereference when handling LVDS connectors. If the system processes LVDS configuration data that contains an invalid or missing "ext_caps" pointer, the kernel will attempt to access memory through the pointer and crash, resulting in a denial‑of‑service on the host. This type of fault can cause the operating system to reboot or become unresponsive, but does not directly grant an attacker privileged code execution or data disclosure. Based on the description, it is inferred that the likely attack vector is local, requiring a user or process to supply malformed LVDS configuration data to trigger the null pointer dereference.

Affected Systems

The vulnerability affects the generic Linux kernel, specifically the drm/amd/display code path used by AMD graphics drivers on systems that support LVDS displays. Because the CNA does not list specific kernel versions, any instance of the kernel that has not incorporated the security‑fix commit is potentially vulnerable. Users running older kernels or custom builds that omit this patch may be impacted.

Risk and Exploitability

An EPSS score of less than 1% indicates a very low but nonzero probability of exploit, and the vulnerability is not listed in the CISA KEV catalog, suggesting no known exploitation in the wild. Consequently, the formal risk rating is still low to moderate based on the severity of a kernel crash. If the device driver accepts LVDS configuration data from user space or from external interfaces, a local attacker could craft malicious input to trigger the exception. The vulnerability has been addressed in a kernel commit; systems that have not applied the patch may want to evaluate the attack surface or rely on the patch to mitigate the issue.

Generated by OpenCVE AI on May 7, 2026 at 19:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a release that contains the security‑fix commit (e.g., the latest stable kernel or a back‑ported patch that implements the ext_caps null check).
  • If upgrading the kernel is not immediately feasible, apply a lightweight local patch that adds an explicit validity check for ext_caps before accessing it, or disable LVDS connectors in the system configuration to prevent the code path from being exercised.
  • Monitor system logs for out‑of‑bounds or kernel panic events that could indicate attempts to exploit the flaw.

Generated by OpenCVE AI on May 7, 2026 at 19:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 18:45:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Thu, 23 Apr 2026 00:15:00 +0000


Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: check if ext_caps is valid in BL setup LVDS connectors don't have extended backlight caps so check if the pointer is valid before accessing it. (cherry picked from commit 3f797396d7f4eb9bb6eded184bbc6f033628a6f6)
Title drm/amd/display: check if ext_caps is valid in BL setup
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:09:09.275Z

Reserved: 2026-03-09T15:48:24.092Z

Link: CVE-2026-31460

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-22T14:16:41.550

Modified: 2026-05-07T18:36:06.137

Link: CVE-2026-31460

cve-icon Redhat

Severity :

Publid Date: 2026-04-22T00:00:00Z

Links: CVE-2026-31460 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T20:00:12Z

Weaknesses