Description
In the Linux kernel, the following vulnerability has been resolved:

PM: EM: Fix NULL pointer dereference when perf domain ID is not found

dev_energymodel_nl_get_perf_domains_doit() calls
em_perf_domain_get_by_id() but does not check the return value before
passing it to __em_nl_get_pd_size(). When a caller supplies a
non-existent perf domain ID, em_perf_domain_get_by_id() returns NULL,
and __em_nl_get_pd_size() immediately dereferences pd->cpus
(struct offset 0x30), causing a NULL pointer dereference.

The sister handler dev_energymodel_nl_get_perf_table_doit() already
handles this correctly via __em_nl_get_pd_table_id(), which returns
NULL and causes the caller to return -EINVAL. Add the same NULL check
in the get-perf-domains do handler.

[ rjw: Subject and changelog edits ]
Published: 2026-05-01
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A NULL pointer dereference occurs in the Linux kernel when a non‑existent performance domain ID is requested through the energy model netlink interface. The handler calls a routine that returns NULL for an absent domain but does not check the result before dereferencing a member in the next function. If triggered, the kernel attempts to access a null reference, causing a panic that halts the system. This flaw is a classic NULL pointer dereference (CWE‑252).

Affected Systems

All Linux kernel releases that expose the energy model netlink interface and that do not yet include commit 9badc2a84e688be1275bb740942d5f6f51746908 are affected. The vulnerability affects the kernel’s performance‑domain querying code used by the energy model subsystem and applies to both production and development builds based on the upstream Linux tree.

Risk and Exploitability

The CVSS score is not listed and EPSS data is unavailable, however a kernel crash represents high impact. The flaw can be triggered by any process that can invoke the energy model netlink interface; normally this capability is limited to privileged users, so the attack vector is local with elevated privileges. The vulnerability is not in CISA’s KEV catalog and no public exploits have been reported, but the denial‑of‑service risk remains until the kernel is patched.

Generated by OpenCVE AI on May 2, 2026 at 10:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the kernel update that includes commit 9badc2a84e688be1275bb740942d5f6f51746908.
  • Restrict access to the energy model netlink interface so that only privileged users can use it.
  • If the energy model performance domain feature is not required, disable or unload the related kernel configuration to remove the attack surface.

Generated by OpenCVE AI on May 2, 2026 at 10:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 00:15:00 +0000


Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: PM: EM: Fix NULL pointer dereference when perf domain ID is not found dev_energymodel_nl_get_perf_domains_doit() calls em_perf_domain_get_by_id() but does not check the return value before passing it to __em_nl_get_pd_size(). When a caller supplies a non-existent perf domain ID, em_perf_domain_get_by_id() returns NULL, and __em_nl_get_pd_size() immediately dereferences pd->cpus (struct offset 0x30), causing a NULL pointer dereference. The sister handler dev_energymodel_nl_get_perf_table_doit() already handles this correctly via __em_nl_get_pd_table_id(), which returns NULL and causes the caller to return -EINVAL. Add the same NULL check in the get-perf-domains do handler. [ rjw: Subject and changelog edits ]
Title PM: EM: Fix NULL pointer dereference when perf domain ID is not found
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:14:38.820Z

Reserved: 2026-03-09T15:48:24.138Z

Link: CVE-2026-31744

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:37.157

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-31744

cve-icon Redhat

Severity :

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-31744 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T10:30:40Z

Weaknesses