Description
In the Linux kernel, the following vulnerability has been resolved:

drm/client: Do not destroy NULL modes

'modes' in drm_client_modeset_probe may fail to kcalloc. If this
occurs, we jump to 'out', calling modes_destroy on it, which
dereferences it. This may result in a NULL pointer dereference in the
error case. Prevent that.
Published: 2026-03-25
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Kernel crash/Denial of Service
Action: Patch
AI Analysis

Impact

A missing null check in the DRM client’s mode‑set probe allows a failure in memory allocation to trigger a null pointer dereference when the code attempts to destroy the partially created mode. This flaw can cause the kernel to crash, resulting in a denial of service. The weakness is a classic CWE‑824 scenario involving premature free or use of uninitialized memory.

Affected Systems

The vulnerability affects the Linux kernel’s DRM client module. The CPE string indicates all Linux kernel builds are potentially impacted. No specific kernel versions are listed, so any kernel that includes the DRM subsystem and has not yet applied the upstream patch is vulnerable.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not catalogued in CISA’s KEV list. Based on the description, the likely attack vector is local: a user or process that can trigger the DRM mode‑set path could cause the crash. Remote exploitation is not explicitly supported or required by the data provided.

Generated by OpenCVE AI on March 26, 2026 at 03:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest kernel update that incorporates the fix for the null pointer dereference in drm_client_modeset_probe. The commit references in the official advisory point to the exact patch. If an immediate update is not possible, consider disabling the DRM subsystem or the specific driver until a patch is applied. Monitor system logs for DRM related errors and verify that the kernel is not attempting to free uninitialized mode structures.

Generated by OpenCVE AI on March 26, 2026 at 03:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 24 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476
CPEs cpe:2.3:o:linux:linux_kernel:6.16:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

Thu, 26 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-824
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/client: Do not destroy NULL modes 'modes' in drm_client_modeset_probe may fail to kcalloc. If this occurs, we jump to 'out', calling modes_destroy on it, which dereferences it. This may result in a NULL pointer dereference in the error case. Prevent that.
Title drm/client: Do not destroy NULL modes
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:05:55.022Z

Reserved: 2026-01-13T15:37:46.002Z

Link: CVE-2026-23366

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T11:16:35.873

Modified: 2026-04-24T18:41:12.913

Link: CVE-2026-23366

cve-icon Redhat

Severity : Low

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23366 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:15:52Z

Weaknesses