PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-43243 Linux CVE debrief

CVE-2026-43243 is a Linux kernel vulnerability in the AMD display code path that can trigger a crash when the driver tries to access link-encoder state on a DPIA link. NVD rates the issue as medium severity with availability impact only, and lists multiple affected kernel release ranges that are fixed in later stable updates.

Vendor
Linux
Product
CVE-2026-43243
CVSS
MEDIUM 5.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-06
Original CVE updated
2026-05-11
Advisory published
2026-05-06
Advisory updated
2026-05-11

Who should care

Linux kernel maintainers, distribution security teams, and operators running affected 6.11, 6.13, or 6.19 kernel series with AMD display support. Systems using the impacted DRM/amd/display path are the main concern.

Technical summary

The CVE description says the Linux kernel drm/amd/display code needed an added signal-type check in dcn401 get_phyd32clk_src because attempting to access link enc on a dpia link would otherwise cause a crash. NVD classifies the weakness as local, low-complexity, low-privilege, no-user-interaction, and availability-only (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). NVD’s affected CPE ranges are kernel versions starting at 6.11 before 6.12.75, starting at 6.13 before 6.18.16, and starting at 6.19 before 6.19.6.

Defensive priority

Medium. This is a crash/availability issue rather than a confidentiality or integrity issue, but it can still take down affected systems or sessions using the impacted display path.

Recommended defensive actions

  • Update Linux kernels to versions that include the upstream/stable fixes referenced in the NVD record.
  • Prioritize systems using AMD graphics/display features and kernels in the affected 6.11, 6.13, or 6.19 ranges.
  • Track distribution backports, since patched vendor kernels may not share the exact upstream version numbers listed by NVD.
  • If immediate patching is not possible, reduce exposure on systems that do not need the affected AMD display path and monitor for kernel display-related crashes.

Evidence notes

This debrief is based on the CVE description and the official NVD record. The source description explicitly states that adding a signal type check in drm/amd/display resolves a crash caused by accessing link enc on a dpia link. NVD provides the CVSS vector, affected kernel version ranges, and patch references. No exploit method or unsupported impact claims are included.

Official resources

CVE published on 2026-05-06 and last modified on 2026-05-11, matching the supplied CVE and source timestamps. NVD marked the record as analyzed and included patch references in the official advisory metadata.