Impact
The Linux kernel contains a NULL pointer dereference in the function icc_link_nodes for the Qualcomm SM8450 interconnect. During platform probe, an invalid destination pointer causes a kernel Oops, which results in a panic and may restart the system. The flaw is a classic null dereference vulnerability that can interrupt normal operation without providing confidentiality or integrity gains.
Affected Systems
Affected systems are any Linux kernel installations that include the Qualcomm SM8450 interconnect driver and have not applied the recent patch. This includes kernel builds for devices using the SM8450 platform where dynamic IDs for interconnects were updated but left two links unconverted. No specific kernel version was listed, so all kernels prior to the commit that addressed this issue are potentially vulnerable.
Risk and Exploitability
Exploitability metrics are not available; the flaw was not listed in CISA KEV and no EPSS score is published. The attack likely requires privileged access to the kernel such as device driver loading or manipulation of the interconnect configuration, making it a local privilege escalation scenario. Once executed, the kernel crash signifies high severity but the lack of publicly documented exploitation reduces immediate risk. Nonetheless, any kernel that can load the affected driver must be considered vulnerable until patched.
OpenCVE Enrichment