Impact
The flaw is a NULL pointer dereference in the AMD graphics driver’s dcn401_init_hw() function, which can cause the kernel to call a null callback during hardware initialisation. This missing validation can lead to a kernel crash and potentially elevate the attacker’s privileges if local code execution is achieved.
Affected Systems
The vulnerability is present in the Linux kernel’s AMD display driver (drm/amd/display). All kernels that include the affected dcn401_init_hw() code path are at risk; no specific version numbers are given, so any unpatched kernel containing that code is vulnerable.
Risk and Exploitability
Because the defect lies in kernel space, exploitation is a local scenario that could result in denial of service or privilege escalation. The EPSS score is not available and the issue is not listed in the CISA KEV catalog, but the nature of a NULL pointer dereference in kernel code indicates a high severity risk. A successful trigger would cause a kernel panic or allow local privilege escalation if the attacker can provoke the update path, for example by changing display frequencies.
OpenCVE Enrichment