Duty Analyst: Joseph McCarthy

CVE-2026-43367

Published: 2026-05-08 15:16:48 | Last modified: 2026-05-15 15:42:18

MEDIUM CVSS 5.5
No EPSS data

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/amd: Fix a few more NULL pointer dereference in device cleanup

I found a few more paths that cleanup fails due to a NULL version pointer
on unsupported hardware.

Add NULL checks as applicable.

(cherry picked from commit f5a05f8414fc10f307eb965f303580c7778f8dd2)

CVSS details

Severity
medium
Score
5.5
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

This CVE is not currently listed in the EPSS dataset.

Show JSON
{
    "cve": {
        "id": "CVE-2026-43367",
        "cveTags": [],
        "metrics": {
            "cvssMetricV31": [
                {
                    "type": "Primary",
                    "source": "nvd@nist.gov",
                    "cvssData": {
                        "scope": "UNCHANGED",
                        "version": "3.1",
                        "baseScore": 5.5,
                        "attackVector": "LOCAL",
                        "baseSeverity": "MEDIUM",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                        "integrityImpact": "NONE",
                        "userInteraction": "NONE",
                        "attackComplexity": "LOW",
                        "availabilityImpact": "HIGH",
                        "privilegesRequired": "LOW",
                        "confidentialityImpact": "NONE"
                    },
                    "impactScore": 3.6,
                    "exploitabilityScore": 1.8
                }
            ]
        },
        "published": "2026-05-08T15:16:47.737",
        "references": [
            {
                "url": "https://git.kernel.org/stable/c/38f1640db7f8bf57b9e09c5b0b8b205a598f1b3e",
                "tags": [
                    "Patch"
                ],
                "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
            },
            {
                "url": "https://git.kernel.org/stable/c/5edcb0d6729b88f192ec8b0896aaf581e3593c9c",
                "tags": [
                    "Patch"
                ],
                "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
            },
            {
                "url": "https://git.kernel.org/stable/c/72ecb1dae72775fa9fea0159d8445d620a0a2295",
                "tags": [
                    "Patch"
                ],
                "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
            }
        ],
        "vulnStatus": "Analyzed",
        "weaknesses": [
            {
                "type": "Primary",
                "source": "nvd@nist.gov",
                "description": [
                    {
                        "lang": "en",
                        "value": "CWE-476"
                    }
                ]
            }
        ],
        "descriptions": [
            {
                "lang": "en",
                "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd: Fix a few more NULL pointer dereference in device cleanup\n\nI found a few more paths that cleanup fails due to a NULL version pointer\non unsupported hardware.\n\nAdd NULL checks as applicable.\n\n(cherry picked from commit f5a05f8414fc10f307eb965f303580c7778f8dd2)"
            }
        ],
        "lastModified": "2026-05-15T15:42:18.453",
        "configurations": [
            {
                "nodes": [
                    {
                        "negate": false,
                        "cpeMatch": [
                            {
                                "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                                "vulnerable": true,
                                "matchCriteriaId": "0CED11FB-4FAA-4224-93EC-23FC2358D4C7",
                                "versionEndExcluding": "6.18.19",
                                "versionStartIncluding": "6.18.16"
                            },
                            {
                                "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                                "vulnerable": true,
                                "matchCriteriaId": "2CFC1CE8-19E1-4AFC-BF52-43BDD2561EE6",
                                "versionEndExcluding": "6.19.9",
                                "versionStartIncluding": "6.19.6"
                            }
                        ],
                        "operator": "OR"
                    }
                ]
            }
        ],
        "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
    }
}