CVE-2026-43337
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
08/05/2026
Last modified:
15/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/amd/display: Fix NULL pointer dereference in dcn401_init_hw()<br />
<br />
dcn401_init_hw() assumes that update_bw_bounding_box() is valid when<br />
entering the update path. However, the existing condition:<br />
<br />
((!fams2_enable && update_bw_bounding_box) || freq_changed)<br />
<br />
does not guarantee this, as the freq_changed branch can evaluate to true<br />
independently of the callback pointer.<br />
<br />
This can result in calling update_bw_bounding_box() when it is NULL.<br />
<br />
Fix this by separating the update condition from the pointer checks and<br />
ensuring the callback, dc->clk_mgr, and bw_params are validated before<br />
use.<br />
<br />
Fixes the below:<br />
../dc/hwss/dcn401/dcn401_hwseq.c:367 dcn401_init_hw() error: we previously assumed &#39;dc->res_pool->funcs->update_bw_bounding_box&#39; could be null (see line 362)<br />
<br />
(cherry picked from commit 86117c5ab42f21562fedb0a64bffea3ee5fcd477)
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11.3 (including) | 6.18.22 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



