{"api_version":"1","generated_at":"2026-05-09T10:41:13+00:00","cve":"CVE-2026-43335","urls":{"html":"https://cve.report/CVE-2026-43335","api":"https://cve.report/api/cve/CVE-2026-43335.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-43335","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-43335"},"summary":{"title":"interconnect: qcom: sm8450: Fix NULL pointer dereference in icc_link_nodes()","description":"In the Linux kernel, the following vulnerability has been resolved:\n\ninterconnect: qcom: sm8450: Fix NULL pointer dereference in icc_link_nodes()\n\nThe change to dynamic IDs for SM8450 platform interconnects left two links\nunconverted, fix it to avoid the NULL pointer dereference in runtime,\nwhen a pointer to a destination interconnect is not valid:\n\n    Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008\n    <...>\n    Call trace:\n      icc_link_nodes+0x3c/0x100 (P)\n      qcom_icc_rpmh_probe+0x1b4/0x528\n      platform_probe+0x64/0xc0\n      really_probe+0xc4/0x2a8\n      __driver_probe_device+0x80/0x140\n      driver_probe_device+0x48/0x170\n      __device_attach_driver+0xc0/0x148\n      bus_for_each_drv+0x88/0xf0\n      __device_attach+0xb0/0x1c0\n      device_initial_probe+0x58/0x68\n      bus_probe_device+0x40/0xb8\n      deferred_probe_work_func+0x90/0xd0\n      process_one_work+0x15c/0x3c0\n      worker_thread+0x2e8/0x400\n      kthread+0x150/0x208\n      ret_from_fork+0x10/0x20\n     Code: 900310f4 911d6294 91008280 94176078 (f94002a0)\n     ---[ end trace 0000000000000000 ]---\n     Kernel panic - not syncing: Oops: Fatal exception","state":"PUBLISHED","assigner":"Linux","published_at":"2026-05-08 14:16:43","updated_at":"2026-05-08 14:16:43"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/dbbd550d7c8d90d3af9fe8a12a9caff077ddb8e3","name":"https://git.kernel.org/stable/c/dbbd550d7c8d90d3af9fe8a12a9caff077ddb8e3","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/77d22bf3fc5d1bcdee035979b07840c9c2ece8f2","name":"https://git.kernel.org/stable/c/77d22bf3fc5d1bcdee035979b07840c9c2ece8f2","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-43335","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43335","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 51513bec806fbe1cf9254baed97f115a480bbb53 77d22bf3fc5d1bcdee035979b07840c9c2ece8f2 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 51513bec806fbe1cf9254baed97f115a480bbb53 dbbd550d7c8d90d3af9fe8a12a9caff077ddb8e3 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6.19","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.12 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/interconnect/qcom/sm8450.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"77d22bf3fc5d1bcdee035979b07840c9c2ece8f2","status":"affected","version":"51513bec806fbe1cf9254baed97f115a480bbb53","versionType":"git"},{"lessThan":"dbbd550d7c8d90d3af9fe8a12a9caff077ddb8e3","status":"affected","version":"51513bec806fbe1cf9254baed97f115a480bbb53","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/interconnect/qcom/sm8450.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"6.19"},{"lessThan":"6.19","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.12","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.12","versionStartIncluding":"6.19","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"6.19","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ninterconnect: qcom: sm8450: Fix NULL pointer dereference in icc_link_nodes()\n\nThe change to dynamic IDs for SM8450 platform interconnects left two links\nunconverted, fix it to avoid the NULL pointer dereference in runtime,\nwhen a pointer to a destination interconnect is not valid:\n\n    Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008\n    <...>\n    Call trace:\n      icc_link_nodes+0x3c/0x100 (P)\n      qcom_icc_rpmh_probe+0x1b4/0x528\n      platform_probe+0x64/0xc0\n      really_probe+0xc4/0x2a8\n      __driver_probe_device+0x80/0x140\n      driver_probe_device+0x48/0x170\n      __device_attach_driver+0xc0/0x148\n      bus_for_each_drv+0x88/0xf0\n      __device_attach+0xb0/0x1c0\n      device_initial_probe+0x58/0x68\n      bus_probe_device+0x40/0xb8\n      deferred_probe_work_func+0x90/0xd0\n      process_one_work+0x15c/0x3c0\n      worker_thread+0x2e8/0x400\n      kthread+0x150/0x208\n      ret_from_fork+0x10/0x20\n     Code: 900310f4 911d6294 91008280 94176078 (f94002a0)\n     ---[ end trace 0000000000000000 ]---\n     Kernel panic - not syncing: Oops: Fatal exception"}],"providerMetadata":{"dateUpdated":"2026-05-08T13:31:21.623Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/77d22bf3fc5d1bcdee035979b07840c9c2ece8f2"},{"url":"https://git.kernel.org/stable/c/dbbd550d7c8d90d3af9fe8a12a9caff077ddb8e3"}],"title":"interconnect: qcom: sm8450: Fix NULL pointer dereference in icc_link_nodes()","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-43335","datePublished":"2026-05-08T13:31:21.623Z","dateReserved":"2026-05-01T14:12:56.002Z","dateUpdated":"2026-05-08T13:31:21.623Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-08 14:16:43","lastModifiedDate":"2026-05-08 14:16:43","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"43335","Ordinal":"1","Title":"interconnect: qcom: sm8450: Fix NULL pointer dereference in icc_","CVE":"CVE-2026-43335","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"43335","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\ninterconnect: qcom: sm8450: Fix NULL pointer dereference in icc_link_nodes()\n\nThe change to dynamic IDs for SM8450 platform interconnects left two links\nunconverted, fix it to avoid the NULL pointer dereference in runtime,\nwhen a pointer to a destination interconnect is not valid:\n\n    Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008\n    <...>\n    Call trace:\n      icc_link_nodes+0x3c/0x100 (P)\n      qcom_icc_rpmh_probe+0x1b4/0x528\n      platform_probe+0x64/0xc0\n      really_probe+0xc4/0x2a8\n      __driver_probe_device+0x80/0x140\n      driver_probe_device+0x48/0x170\n      __device_attach_driver+0xc0/0x148\n      bus_for_each_drv+0x88/0xf0\n      __device_attach+0xb0/0x1c0\n      device_initial_probe+0x58/0x68\n      bus_probe_device+0x40/0xb8\n      deferred_probe_work_func+0x90/0xd0\n      process_one_work+0x15c/0x3c0\n      worker_thread+0x2e8/0x400\n      kthread+0x150/0x208\n      ret_from_fork+0x10/0x20\n     Code: 900310f4 911d6294 91008280 94176078 (f94002a0)\n     ---[ end trace 0000000000000000 ]---\n     Kernel panic - not syncing: Oops: Fatal exception","Type":"Description","Title":"interconnect: qcom: sm8450: Fix NULL pointer dereference in icc_"}]}}}