Description
In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: Fix null pointer dereference issue

If SMU is disabled, during RAS initialization,
there will be null pointer dereference issue here.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a null pointer dereference in the kernel driver path drm/amd/pm that occurs during Run‑Time Access State (RAS) initialization when the SMU (System Management Unit) is disabled. The flaw can cause the kernel to crash, leading to a denial of service condition. While the description does not explicitly state escalation, a crash in kernel context could potentially allow code execution if an attacker can trigger the failure while operating with privileged kernel context; this is inferred and not directly supported by the advisory.

Affected Systems

This issue affects the Linux kernel in general. No specific kernel release range is identified in the advisory; the vendor is Linux, and affected builds may include any kernel where the drm/amd/pm driver and SMU handling are present.

Risk and Exploitability

The EPSS score is not available and the flaw is not listed in CISA’s KEV catalog, indicating no publicly known exploitation at this time. The CVSS score is not reported, but the potential for a kernel panic suggests a moderate to high risk if the conditions are met. Because the failure requires the SMU to be disabled, the attack vector is likely local and hardware‑dependent, so routine patching remains the primary defense.

Generated by OpenCVE AI on May 6, 2026 at 15:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a Linux kernel update that incorporates the fix
  • Configure the system to enable SMU support so that RAS initialization does not occur with a disabled SMU
  • If immediate kernel upgrade is unavailable, disable RAS initialization through kernel parameters as a temporary mitigation

Generated by OpenCVE AI on May 6, 2026 at 15:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Fix null pointer dereference issue If SMU is disabled, during RAS initialization, there will be null pointer dereference issue here.
Title drm/amd/pm: Fix null pointer dereference issue
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:19.528Z

Reserved: 2026-05-01T14:12:55.988Z

Link: CVE-2026-43131

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:30.243

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43131

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T17:30:07Z

Weaknesses