Description
In the Linux kernel, the following vulnerability has been resolved:

nouveau/dpcd: return EBUSY for aux xfer if the device is asleep

If we have runtime suspended, and userspace wants to use /dev/drm_dp_*
then just tell it the device is busy instead of crashing in the GSP
code.

WARNING: CPU: 2 PID: 565741 at drivers/gpu/drm/nouveau/nvkm/subdev/gsp/rm/r535/rpc.c:164 r535_gsp_msgq_wait+0x9a/0xb0 [nouveau]
CPU: 2 UID: 0 PID: 565741 Comm: fwupd Not tainted 6.18.10-200.fc43.x86_64 #1 PREEMPT(lazy)
Hardware name: LENOVO 20QTS0PQ00/20QTS0PQ00, BIOS N2OET65W (1.52 ) 08/05/2024
RIP: 0010:r535_gsp_msgq_wait+0x9a/0xb0 [nouveau]

This is a simple fix to get backported. We should probably engineer a
proper power domain solution to wake up devices and keep them awake
while fw updates are happening.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The nouveau driver in the Linux kernel attempted an auxiliary transfer through the /dev/drm_dp_* interface while the GPU was in a runtime suspended state. Instead of indicating that the device was unavailable, the driver sent a request to the GPU’s GSP code, a call that is invalid when the GPU is asleep, and this caused the kernel to crash. The crash results in a kernel panic, effectively shutting down the host operating system. This flaw is a classic example of a fault in proprietary code that can lead to a denial‑of‑service by corrupting the control flow of the kernel (CWE‑367).

Affected Systems

All Linux kernel releases that ship the nouveau graphics driver without the recent patch are affected. The vulnerability was demonstrated on a system running kernel 6.18.10‑200.fc43.x86_64 and applies across all distributions where this driver is present, regardless of vendor. No specific version range is claimed beyond the presence of the vulnerable code.

Risk and Exploitability

The vulnerability does not have an assigned CVSS score and the EPSS score is not available. It is not listed in CISA’s KEV catalog, indicating no large‑scale exploitation has been reported. Based on the description, the likely attack vector is local: an attacker must run code that can invoke the /dev/drm_dp_* interface while the GPU is asleep, such as a privileged process or a firmware‑upgrade client. Because the error leads to a kernel crash, the impact is high, as it can bring the entire system down and require a reboot. The lack of remote exploitation paths or elevated privilege prerequisites makes the risk lower than a remote exploit, but the potential for an unwanted system crash is still significant.

Generated by OpenCVE AI on May 9, 2026 at 05:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a release that includes the patched nouveau driver.
  • If an immediate kernel update is not possible, temporarily restrict or disable access to /dev/drm_dp_* while the system is in runtime suspend or during firmware updates.
  • Configure fwupd or other firmware‑upgrade tools so that they do not access the GPU while it is asleep, or use power‑domain management to keep the GPU awake during updates.
  • Monitor system logs for GSP or EBUSY errors to detect unintended accesses during sleep.

Generated by OpenCVE AI on May 9, 2026 at 05:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 03:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Sat, 09 May 2026 00:15:00 +0000


Fri, 08 May 2026 17:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: nouveau/dpcd: return EBUSY for aux xfer if the device is asleep If we have runtime suspended, and userspace wants to use /dev/drm_dp_* then just tell it the device is busy instead of crashing in the GSP code. WARNING: CPU: 2 PID: 565741 at drivers/gpu/drm/nouveau/nvkm/subdev/gsp/rm/r535/rpc.c:164 r535_gsp_msgq_wait+0x9a/0xb0 [nouveau] CPU: 2 UID: 0 PID: 565741 Comm: fwupd Not tainted 6.18.10-200.fc43.x86_64 #1 PREEMPT(lazy) Hardware name: LENOVO 20QTS0PQ00/20QTS0PQ00, BIOS N2OET65W (1.52 ) 08/05/2024 RIP: 0010:r535_gsp_msgq_wait+0x9a/0xb0 [nouveau] This is a simple fix to get backported. We should probably engineer a proper power domain solution to wake up devices and keep them awake while fw updates are happening.
Title nouveau/dpcd: return EBUSY for aux xfer if the device is asleep
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:21:29.340Z

Reserved: 2026-05-01T14:12:56.006Z

Link: CVE-2026-43381

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:49.333

Modified: 2026-05-08T15:16:49.333

Link: CVE-2026-43381

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43381 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T05:45:26Z

Weaknesses