Description
In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scmi: Fix NULL dereference on notify error path

Since commit b5daf93b809d1 ("firmware: arm_scmi: Avoid notifier
registration for unsupported events") the call chains leading to the helper
__scmi_event_handler_get_ops expect an ERR_PTR to be returned on failure to
get an handler for the requested event key, while the current helper can
still return a NULL when no handler could be found or created.

Fix by forcing an ERR_PTR return value when the handler reference is NULL.
Published: 2026-04-24
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Kernel crash (Denial of Service)
Action: Immediate Patch
AI Analysis

Impact

The Linux firmware subsystem for Arm Scmi had a flaw that allowed a NULL pointer dereference when handling notifications for unsupported events. The helper function responsible for retrieving an event handler could return NULL instead of an error pointer, causing code later to dereference this NULL value and crash the kernel. This is a classic null dereference vulnerability (CWE‑476) that results in a kernel OOPS and loss of availability.

Affected Systems

All releases of the Linux kernel that contain the arm_scmi firmware subsystem and do not include the commit b5daf93b809d1 (the fix). No explicit vulnerable version range is listed, so any kernel prior to that commit is potentially affected. The vulnerability applies to the Linux:Linux product family.

Risk and Exploitability

The CVSS score of 5.5 indicates a medium‑severity condition. The EPSS score of < 1 % shows that the probability of exploitation is very low at present. The vulnerability is not listed in the CISA KEV catalog, which further suggests limited current exploitation activity. The likely attack vector is local, requiring code that can trigger the scm event path; the issue primarily leads to a crash rather than privilege escalation. Overall risk is moderate, with the main threat being denial of service through a kernel crash.

Generated by OpenCVE AI on April 28, 2026 at 06:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel update that incorporates commit b5daf93b809d1.
  • If an update is unavailable, backport the patch to your current kernel source and rebuild the kernel.
  • After rebuilding, verify that Scmi event notifications no longer trigger NULL dereference errors, and if problems persist, consider disabling Scmi support in the kernel configuration.

Generated by OpenCVE AI on April 28, 2026 at 06:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*

Sat, 25 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Fix NULL dereference on notify error path Since commit b5daf93b809d1 ("firmware: arm_scmi: Avoid notifier registration for unsupported events") the call chains leading to the helper __scmi_event_handler_get_ops expect an ERR_PTR to be returned on failure to get an handler for the requested event key, while the current helper can still return a NULL when no handler could be found or created. Fix by forcing an ERR_PTR return value when the handler reference is NULL.
Title firmware: arm_scmi: Fix NULL dereference on notify error path
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:10:49.780Z

Reserved: 2026-03-09T15:48:24.114Z

Link: CVE-2026-31544

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:28.457

Modified: 2026-04-28T18:32:06.167

Link: CVE-2026-31544

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31544 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T07:00:09Z

Weaknesses