-
CVE-2026-43381
- EPSS 0.03%
- Veröffentlicht 08.05.2026 14:21:29
- Zuletzt bearbeitet 12.05.2026 14:10:27
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
nouveau/dpcd: return EBUSY for aux xfer if the device is asleep
In the Linux kernel, the following vulnerability has been resolved: nouveau/dpcd: return EBUSY for aux xfer if the device is asleep If we have runtime suspended, and userspace wants to use /dev/drm_dp_* then just tell it the device is busy instead of crashing in the GSP code. WARNING: CPU: 2 PID: 565741 at drivers/gpu/drm/nouveau/nvkm/subdev/gsp/rm/r535/rpc.c:164 r535_gsp_msgq_wait+0x9a/0xb0 [nouveau] CPU: 2 UID: 0 PID: 565741 Comm: fwupd Not tainted 6.18.10-200.fc43.x86_64 #1 PREEMPT(lazy) Hardware name: LENOVO 20QTS0PQ00/20QTS0PQ00, BIOS N2OET65W (1.52 ) 08/05/2024 RIP: 0010:r535_gsp_msgq_wait+0x9a/0xb0 [nouveau] This is a simple fix to get backported. We should probably engineer a proper power domain solution to wake up devices and keep them awake while fw updates are happening.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
8894f4919bc43f821775db2cfff4b917871b2102
Version <
178df7c91e6c202579284df9f79d1592a514cdcf
Status
affected
Version
8894f4919bc43f821775db2cfff4b917871b2102
Version <
4df518aa196085909fd7e32518ecd27fba60ed69
Status
affected
Version
8894f4919bc43f821775db2cfff4b917871b2102
Version <
cd24cab2023aa46b595bc6b9cc39d8973d9d0a8c
Status
affected
Version
8894f4919bc43f821775db2cfff4b917871b2102
Version <
fad178ae894930520519ead3c8e0150641466360
Status
affected
Version
8894f4919bc43f821775db2cfff4b917871b2102
Version <
6bdd2d70c338d52c387d3b3aadc596784ae81b01
Status
affected
Version
8894f4919bc43f821775db2cfff4b917871b2102
Version <
ad8fa5bff53f5d1f8394f996850da8ce070eaee3
Status
affected
Version
8894f4919bc43f821775db2cfff4b917871b2102
Version <
24639553a016578222ac597db924dfb6fa5ec8b5
Status
affected
Version
8894f4919bc43f821775db2cfff4b917871b2102
Version <
8f3c6f08ababad2e3bdd239728cf66a9949446b4
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.16
Status
affected
Version
0
Version <
3.16
Status
unaffected
Version <=
5.10.*
Version
5.10.253
Status
unaffected
Version <=
5.15.*
Version
5.15.203
Status
unaffected
Version <=
6.1.*
Version
6.1.167
Status
unaffected
Version <=
6.6.*
Version
6.6.130
Status
unaffected
Version <=
6.12.*
Version
6.12.78
Status
unaffected
Version <=
6.18.*
Version
6.18.19
Status
unaffected
Version <=
6.19.*
Version
6.19.9
Status
unaffected
Version <=
*
Version
7.0
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.094 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|