CVE-2026-43072
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/vc4: platform_get_irq_byname() returns an int
platform_get_irq_byname() will return a negative value if an error happens, so it should be checked and not just passed directly into devm_request_threaded_irq() hoping all will be ok.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's DRM vc4 driver, the return value of platform_get_irq_byname() was not checked, potentially leading to use of a negative IRQ number.
Vulnerability
In the Linux kernel's DRM vc4 driver (drm/vc4), the function platform_get_irq_byname() returns an integer, which can be negative on error. The driver was passing this value directly to devm_request_threaded_irq() without checking for errors. This can lead to passing a negative IRQ number to the interrupt registration function, resulting in undefined behavior.
Exploitation
An attacker would need to trigger the error path in platform_get_irq_byname(), which could occur if the device tree lacks the specified interrupt name or if there is a probe failure. No authentication or special privileges are required beyond the ability to trigger the affected code path, which may be reachable from userspace via DRM ioctls or device enumeration.
Impact
If exploited, this vulnerability could cause a kernel panic, denial of service, or potentially more severe consequences due to the use of an invalid IRQ number. The exact impact depends on the system state and the value of the returned error code.
Mitigation
The issue is fixed in Linux kernel stable commits [1], [2], [3], and [4]. Users should apply the latest updates from their distribution or update to a kernel version containing these patches.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- git.kernel.org/stable/c/0185e0494a561edfc482507f9de89c2ad798b33dnvd
- git.kernel.org/stable/c/0c1b117f7ba46fb8f6ebc5e0bfe5b58568c301banvd
- git.kernel.org/stable/c/63c11b19cdc154fa848a6c3b535bfb1dc7b60378nvd
- git.kernel.org/stable/c/9c10b83a004442c93d7a484c3d221a06a45821e1nvd
- git.kernel.org/stable/c/e597a809a2b97e927060ba182f58eb3e6101bc70nvd
- git.kernel.org/stable/c/ef2ee9db13b68c5e332b77c0a7108a2d4d56e114nvd
News mentions
0No linked articles in our index yet.