Impact
A null‑pointer dereference may occur in the function that removes a DSI panel when the panel driver pointer is NULL. The code continues past a null check and later attempts to access a structure through that pointer, which can lead to a kernel fault and potentially a system crash. The primary impact is the loss of system availability due to the kernel panic that this flaw can trigger. This issue stems from a defect in input validation and pointer safety, classified by CWE‑476.
Affected Systems
Any Linux system running a kernel with the drm/panel implementation described in the advisory is affected. The advisory lists only the generic vendor/product pair "Linux:Linux" and does not specify exact kernel versions, so all distributions whose kernel source contains the unpatched drm/panel code are potentially impacted.
Risk and Exploitability
The CVSS score is not provided and EPSS is not available, which means the formal exploitation likelihood is unknown. The flaw is not listed in CISA's Known Exploited Vulnerabilities catalog, indicating no publicly documented exploitation at the time of this advisory. Because the vulnerability requires execution of the suspicious code path in the kernel (usually triggered by a user who controls the panel or device), the attack vector is likely local and requires privileged or kernel‑mode access. An unhandled null dereference in kernel code can lead to a system crash.
OpenCVE Enrichment