Impact
A missing signal type check in the dcn401 get_phyd32clk_src function within the drm/amd/display component causes an unhandled memory access when attempting to retrieve the link encoder on a DPIA link, resulting in a kernel crash and a loss of service. This flaw is a local issue that leads only to a denial of service, with no documented ability to execute arbitrary code or elevate privileges beyond the kernel context. The crash disrupts normal operation of the display subsystem, potentially rendering the system unusable until rebooted.
Affected Systems
The vulnerability affects the Linux kernel implementation of DRM for AMD display hardware. All distributions shipping an unpatched kernel that includes the drm/amd/display subsystem are potentially impacted, regardless of the distribution vendor. No specific kernel version or release is listed, so any kernel prior to the patch that incorporates the failing code path is at risk.
Risk and Exploitability
The Advisory does not provide a CVSS score or an EPSS value, indicating that the exploitation probability is not quantified and likely low. The flaw is not listed in the CISA KEV catalog, suggesting no confirmed active exploit in the field at this time. However, because the kernel crash can be triggered through a kernel-mode driver operation, a local user with sufficient privileges could potentially cause the failure; remote exploitation would require escalated privileges or a prior kernel vulnerability. The overall risk is therefore moderate, primarily limited to local denial of service unless additional vulnerabilities are chained.
OpenCVE Enrichment