PatchSiren cyber security CVE debrief
CVE-2026-43243 Linux CVE debrief
CVE-2026-43243 is a Linux kernel vulnerability in the AMD display code path that can trigger a crash when the driver tries to access link-encoder state on a DPIA link. NVD rates the issue as medium severity with availability impact only, and lists multiple affected kernel release ranges that are fixed in later stable updates.
- Vendor
- Linux
- Product
- CVE-2026-43243
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-06
- Original CVE updated
- 2026-05-11
- Advisory published
- 2026-05-06
- Advisory updated
- 2026-05-11
Who should care
Linux kernel maintainers, distribution security teams, and operators running affected 6.11, 6.13, or 6.19 kernel series with AMD display support. Systems using the impacted DRM/amd/display path are the main concern.
Technical summary
The CVE description says the Linux kernel drm/amd/display code needed an added signal-type check in dcn401 get_phyd32clk_src because attempting to access link enc on a dpia link would otherwise cause a crash. NVD classifies the weakness as local, low-complexity, low-privilege, no-user-interaction, and availability-only (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). NVD’s affected CPE ranges are kernel versions starting at 6.11 before 6.12.75, starting at 6.13 before 6.18.16, and starting at 6.19 before 6.19.6.
Defensive priority
Medium. This is a crash/availability issue rather than a confidentiality or integrity issue, but it can still take down affected systems or sessions using the impacted display path.
Recommended defensive actions
- Update Linux kernels to versions that include the upstream/stable fixes referenced in the NVD record.
- Prioritize systems using AMD graphics/display features and kernels in the affected 6.11, 6.13, or 6.19 ranges.
- Track distribution backports, since patched vendor kernels may not share the exact upstream version numbers listed by NVD.
- If immediate patching is not possible, reduce exposure on systems that do not need the affected AMD display path and monitor for kernel display-related crashes.
Evidence notes
This debrief is based on the CVE description and the official NVD record. The source description explicitly states that adding a signal type check in drm/amd/display resolves a crash caused by accessing link enc on a dpia link. NVD provides the CVSS vector, affected kernel version ranges, and patch references. No exploit method or unsupported impact claims are included.
Official resources
-
CVE-2026-43243 CVE record
CVE.org
-
CVE-2026-43243 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
CVE published on 2026-05-06 and last modified on 2026-05-11, matching the supplied CVE and source timestamps. NVD marked the record as analyzed and included patch references in the official advisory metadata.