Impact
The vulnerability is a null pointer dereference in the kernel driver path drm/amd/pm that occurs during Run‑Time Access State (RAS) initialization when the SMU (System Management Unit) is disabled. The flaw can cause the kernel to crash, leading to a denial of service condition. While the description does not explicitly state escalation, a crash in kernel context could potentially allow code execution if an attacker can trigger the failure while operating with privileged kernel context; this is inferred and not directly supported by the advisory.
Affected Systems
This issue affects the Linux kernel in general. No specific kernel release range is identified in the advisory; the vendor is Linux, and affected builds may include any kernel where the drm/amd/pm driver and SMU handling are present.
Risk and Exploitability
The EPSS score is not available and the flaw is not listed in CISA’s KEV catalog, indicating no publicly known exploitation at this time. The CVSS score is not reported, but the potential for a kernel panic suggests a moderate to high risk if the conditions are met. Because the failure requires the SMU to be disabled, the attack vector is likely local and hardware‑dependent, so routine patching remains the primary defense.
OpenCVE Enrichment