Description
In the Linux kernel, the following vulnerability has been resolved:

drm/panel: Fix a possible null-pointer dereference in jdi_panel_dsi_remove()

In jdi_panel_dsi_remove(), jdi is explicitly checked, indicating that it
may be NULL:

if (!jdi)
mipi_dsi_detach(dsi);

However, when jdi is NULL, the function does not return and continues by
calling jdi_panel_disable():

err = jdi_panel_disable(&jdi->base);

Inside jdi_panel_disable(), jdi is dereferenced unconditionally, which can
lead to a NULL-pointer dereference:

struct jdi_panel *jdi = to_panel_jdi(panel);
backlight_disable(jdi->backlight);

To prevent such a potential NULL-pointer dereference, return early from
jdi_panel_dsi_remove() when jdi is NULL.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A null‑pointer dereference may occur in the function that removes a DSI panel when the panel driver pointer is NULL. The code continues past a null check and later attempts to access a structure through that pointer, which can lead to a kernel fault and potentially a system crash. The primary impact is the loss of system availability due to the kernel panic that this flaw can trigger. This issue stems from a defect in input validation and pointer safety, classified by CWE‑476.

Affected Systems

Any Linux system running a kernel with the drm/panel implementation described in the advisory is affected. The advisory lists only the generic vendor/product pair "Linux:Linux" and does not specify exact kernel versions, so all distributions whose kernel source contains the unpatched drm/panel code are potentially impacted.

Risk and Exploitability

The CVSS score is not provided and EPSS is not available, which means the formal exploitation likelihood is unknown. The flaw is not listed in CISA's Known Exploited Vulnerabilities catalog, indicating no publicly documented exploitation at the time of this advisory. Because the vulnerability requires execution of the suspicious code path in the kernel (usually triggered by a user who controls the panel or device), the attack vector is likely local and requires privileged or kernel‑mode access. An unhandled null dereference in kernel code can lead to a system crash.

Generated by OpenCVE AI on May 8, 2026 at 15:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that includes the patch commit 2f5427d8726b22b807beec248d7d6bf88e291e0b or a newer version.
  • If a kernel update is not feasible, remove or disable the affected DSI panel hardware or driver to prevent the vulnerable code path from executing.
  • If the DSI panel functionality is required, investigate and apply any vendor‑provided driver or firmware update that addresses the null‑pointer dereference, and re‑engage the device under the updated driver.

Generated by OpenCVE AI on May 8, 2026 at 15:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 00:15:00 +0000


Fri, 08 May 2026 16:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Fri, 08 May 2026 13:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/panel: Fix a possible null-pointer dereference in jdi_panel_dsi_remove() In jdi_panel_dsi_remove(), jdi is explicitly checked, indicating that it may be NULL: if (!jdi) mipi_dsi_detach(dsi); However, when jdi is NULL, the function does not return and continues by calling jdi_panel_disable(): err = jdi_panel_disable(&jdi->base); Inside jdi_panel_disable(), jdi is dereferenced unconditionally, which can lead to a NULL-pointer dereference: struct jdi_panel *jdi = to_panel_jdi(panel); backlight_disable(jdi->backlight); To prevent such a potential NULL-pointer dereference, return early from jdi_panel_dsi_remove() when jdi is NULL.
Title drm/panel: Fix a possible null-pointer dereference in jdi_panel_dsi_remove()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-09T04:10:13.854Z

Reserved: 2026-05-01T14:12:56.000Z

Link: CVE-2026-43300

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T14:16:37.223

Modified: 2026-05-08T14:16:37.223

Link: CVE-2026-43300

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43300 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T16:00:12Z

Weaknesses