Description
In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix NULL pointer dereference in dcn401_init_hw()

dcn401_init_hw() assumes that update_bw_bounding_box() is valid when
entering the update path. However, the existing condition:

((!fams2_enable && update_bw_bounding_box) || freq_changed)

does not guarantee this, as the freq_changed branch can evaluate to true
independently of the callback pointer.

This can result in calling update_bw_bounding_box() when it is NULL.

Fix this by separating the update condition from the pointer checks and
ensuring the callback, dc->clk_mgr, and bw_params are validated before
use.

Fixes the below:
../dc/hwss/dcn401/dcn401_hwseq.c:367 dcn401_init_hw() error: we previously assumed 'dc->res_pool->funcs->update_bw_bounding_box' could be null (see line 362)

(cherry picked from commit 86117c5ab42f21562fedb0a64bffea3ee5fcd477)
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw is a NULL pointer dereference in the AMD graphics driver’s dcn401_init_hw() function, which can cause the kernel to call a null callback during hardware initialisation. This missing validation can lead to a kernel crash and potentially elevate the attacker’s privileges if local code execution is achieved.

Affected Systems

The vulnerability is present in the Linux kernel’s AMD display driver (drm/amd/display). All kernels that include the affected dcn401_init_hw() code path are at risk; no specific version numbers are given, so any unpatched kernel containing that code is vulnerable.

Risk and Exploitability

Because the defect lies in kernel space, exploitation is a local scenario that could result in denial of service or privilege escalation. The EPSS score is not available and the issue is not listed in the CISA KEV catalog, but the nature of a NULL pointer dereference in kernel code indicates a high severity risk. A successful trigger would cause a kernel panic or allow local privilege escalation if the attacker can provoke the update path, for example by changing display frequencies.

Generated by OpenCVE AI on May 8, 2026 at 18:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes the commit that fixes dcn401_init_hw()
  • If a patch cannot be applied immediately, disable the AMD display driver (e.g., set amdgpu.modeset=0 or blacklist the amdgpu module) to stop the vulnerable code path from executing
  • As a temporary workaround, avoid operations that trigger display frequency changes or consider switching to an alternate graphics stack until the kernel is patched

Generated by OpenCVE AI on May 8, 2026 at 18:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 19:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Fri, 08 May 2026 14:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix NULL pointer dereference in dcn401_init_hw() dcn401_init_hw() assumes that update_bw_bounding_box() is valid when entering the update path. However, the existing condition: ((!fams2_enable && update_bw_bounding_box) || freq_changed) does not guarantee this, as the freq_changed branch can evaluate to true independently of the callback pointer. This can result in calling update_bw_bounding_box() when it is NULL. Fix this by separating the update condition from the pointer checks and ensuring the callback, dc->clk_mgr, and bw_params are validated before use. Fixes the below: ../dc/hwss/dcn401/dcn401_hwseq.c:367 dcn401_init_hw() error: we previously assumed 'dc->res_pool->funcs->update_bw_bounding_box' could be null (see line 362) (cherry picked from commit 86117c5ab42f21562fedb0a64bffea3ee5fcd477)
Title drm/amd/display: Fix NULL pointer dereference in dcn401_init_hw()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T13:31:22.967Z

Reserved: 2026-05-01T14:12:56.002Z

Link: CVE-2026-43337

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T14:16:43.517

Modified: 2026-05-08T14:16:43.517

Link: CVE-2026-43337

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T21:45:18Z

Weaknesses