Description
In the Linux kernel, the following vulnerability has been resolved:

platform/x86: classmate-laptop: Add missing NULL pointer checks

In a few places in the Classmate laptop driver, code using the accel
object may run before that object's address is stored in the driver
data of the input device using it.

For example, cmpc_accel_sensitivity_store_v4() is the "show" method
of cmpc_accel_sensitivity_attr_v4 which is added in cmpc_accel_add_v4(),
before calling dev_set_drvdata() for inputdev->dev. If the sysfs
attribute is accessed prematurely, the dev_get_drvdata(&inputdev->dev)
call in in cmpc_accel_sensitivity_store_v4() returns NULL which
leads to a NULL pointer dereference going forward.

Moreover, sysfs attributes using the input device are added before
initializing that device by cmpc_add_acpi_notify_device() and if one
of them is accessed before running that function, a NULL pointer
dereference will occur.

For example, cmpc_accel_sensitivity_attr_v4 is added before calling
cmpc_add_acpi_notify_device() and if it is read prematurely, the
dev_get_drvdata(&acpi->dev) call in cmpc_accel_sensitivity_show_v4()
returns NULL which leads to a NULL pointer dereference going forward.

Fix this by adding NULL pointer checks in all of the relevant places.
Published: 2026-03-04
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

A NULL pointer dereference occurs in the Linux kernel Classmate laptop driver when sysfs attributes are accessed before the driver’s input device data is fully initialized. The fault leads to a kernel crash (oops) because a dev_get_drvdata call returns NULL and the code continues without a check. This is a classic CWE‑476 vulnerability and can be triggered by reading or writing the exposed sysfs entries before the driver’s internal data is ready.

Affected Systems

The flaw affects the Linux kernel, specifically the Classmate laptop driver. Versions 2.6.33 (all RC releases) and 6.19 RC1‑RC8 are listed as impacted. Any kernel containing the legacy classmate‑laptop module without the NULL‑check patch is susceptible.

Risk and Exploitability

The CVSS score is 5.5, indicating moderate severity. The EPSS score is under 1 %, implying the attack probability is very low. The vulnerability is not present in CISA’s KEV list. The likely attack vector is a local escalation or privileged local user who can trigger the sysfs attributes on a system running an affected kernel. Exploitation requires the attacker to interact with the sysfs interface before the driver is fully initialized, causing a kernel crash that can result in loss of service.

Generated by OpenCVE AI on April 16, 2026 at 13:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel release that contains the NULL‑pointer check fix for the Classmate laptop driver.
  • If you build a custom kernel, cherry‑pick the commit(s) that add the NULL checks to the driver and rebuild the kernel.
  • If an immediate patch cannot be applied, avoid accessing the sysfs attributes for the Classmate accelerator until the driver is updated; disabling those sysfs interfaces is a temporary mitigation.

Generated by OpenCVE AI on April 16, 2026 at 13:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4498-1 linux security update
Debian DLA Debian DLA DLA-4499-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6163-1 linux security update
Debian DSA Debian DSA DSA-6162-1 linux security update
History

Tue, 17 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476
CPEs cpe:2.3:o:linux:linux_kernel:2.6.33:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.33:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.33:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*

Thu, 05 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Wed, 04 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: platform/x86: classmate-laptop: Add missing NULL pointer checks In a few places in the Classmate laptop driver, code using the accel object may run before that object's address is stored in the driver data of the input device using it. For example, cmpc_accel_sensitivity_store_v4() is the "show" method of cmpc_accel_sensitivity_attr_v4 which is added in cmpc_accel_add_v4(), before calling dev_set_drvdata() for inputdev->dev. If the sysfs attribute is accessed prematurely, the dev_get_drvdata(&inputdev->dev) call in in cmpc_accel_sensitivity_store_v4() returns NULL which leads to a NULL pointer dereference going forward. Moreover, sysfs attributes using the input device are added before initializing that device by cmpc_add_acpi_notify_device() and if one of them is accessed before running that function, a NULL pointer dereference will occur. For example, cmpc_accel_sensitivity_attr_v4 is added before calling cmpc_add_acpi_notify_device() and if it is read prematurely, the dev_get_drvdata(&acpi->dev) call in cmpc_accel_sensitivity_show_v4() returns NULL which leads to a NULL pointer dereference going forward. Fix this by adding NULL pointer checks in all of the relevant places.
Title platform/x86: classmate-laptop: Add missing NULL pointer checks
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-03-08T10:07:33.737Z

Reserved: 2026-01-13T15:37:45.988Z

Link: CVE-2026-23237

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T15:16:14.350

Modified: 2026-03-17T21:16:04.753

Link: CVE-2026-23237

cve-icon Redhat

Severity : Low

Publid Date: 2026-03-04T00:00:00Z

Links: CVE-2026-23237 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T13:45:21Z

Weaknesses