Impact
In the Linux kernel, a NULL pointer dereference can occur during the cleanup of AMD DRM devices when unsupported hardware is detected. The vulnerability is triggered by the absence of null checks on the device's version pointer, causing a null dereference during device cleanup. This defect illustrates classic null pointer dereference (CWE-476) and could lead to a kernel panic, interrupting system availability.
Affected Systems
Affected systems include Linux kernel users running the AMD DRM driver before the patch introduced in commit f5a05f... This encompasses all kernel releases that have not yet incorporated the null pointer checks in the device cleanup path. The issue is driven by unsupported AMD hardware where the driver fails to validate the version pointer.
Risk and Exploitability
The CVSS score is not published, and EPSS data is unavailable, suggesting limited public exploitation data. The vulnerability is not listed in CISA's KEV catalog. Because the defect occurs in privileged kernel code, the likely attack vector is local or requires elevated permissions, making remote exploitation less probable without a remote code execution vector. Nonetheless, the potential impact is a kernel crash, which could be leveraged for denial of service. Until a patch is applied, the risk remains moderate, but high in environments where unsupported AMD hardware is present and the kernel is exposed to untrusted inputs.
OpenCVE Enrichment