Description
In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add signal type check for dcn401 get_phyd32clk_src

Trying to access link enc on a dpia link will cause a crash otherwise
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A missing signal type check in the dcn401 get_phyd32clk_src function within the drm/amd/display component causes an unhandled memory access when attempting to retrieve the link encoder on a DPIA link, resulting in a kernel crash and a loss of service. This flaw is a local issue that leads only to a denial of service, with no documented ability to execute arbitrary code or elevate privileges beyond the kernel context. The crash disrupts normal operation of the display subsystem, potentially rendering the system unusable until rebooted.

Affected Systems

The vulnerability affects the Linux kernel implementation of DRM for AMD display hardware. All distributions shipping an unpatched kernel that includes the drm/amd/display subsystem are potentially impacted, regardless of the distribution vendor. No specific kernel version or release is listed, so any kernel prior to the patch that incorporates the failing code path is at risk.

Risk and Exploitability

The Advisory does not provide a CVSS score or an EPSS value, indicating that the exploitation probability is not quantified and likely low. The flaw is not listed in the CISA KEV catalog, suggesting no confirmed active exploit in the field at this time. However, because the kernel crash can be triggered through a kernel-mode driver operation, a local user with sufficient privileges could potentially cause the failure; remote exploitation would require escalated privileges or a prior kernel vulnerability. The overall risk is therefore moderate, primarily limited to local denial of service unless additional vulnerabilities are chained.

Generated by OpenCVE AI on May 7, 2026 at 02:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel update that contains the patch for dcn401 get_phyd32clk_src
  • If a kernel upgrade is not immediately feasible, disable DPIA display functionality or unload the affected DRM module until the kernel is patched
  • Continuously monitor system logs for kernel panic events related to dcn401 or drm/amd/display to detect attempts to trigger the crash

Generated by OpenCVE AI on May 7, 2026 at 02:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 00:15:00 +0000


Wed, 06 May 2026 15:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add signal type check for dcn401 get_phyd32clk_src Trying to access link enc on a dpia link will cause a crash otherwise
Title drm/amd/display: Add signal type check for dcn401 get_phyd32clk_src
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:28:36.287Z

Reserved: 2026-05-01T14:12:55.995Z

Link: CVE-2026-43243

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:44.720

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43243

cve-icon Redhat

Severity :

Publid Date: 2026-05-06T00:00:00Z

Links: CVE-2026-43243 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T02:45:06Z

Weaknesses