CVE-2026-23317Detection of Error Condition Without Action in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 97.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 25

Description

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Return the correct value in vmw_translate_ptr functions Before the referenced fixes these functions used a lookup function that returned a pointer. This was changed to another lookup function that returned an error code with the pointer becoming an out parameter. The error path when the lookup failed was not changed to reflect this change and the code continued to return the PTR_ERR of the now uninitialized pointe

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

Linuxlinux/linux_kernel6.2.06.6.130+4
Debianlinux/linux_kernel< 6.19.8-1
CVEListV5linux/linux7ac9578e45b20e3f3c0c8eb71f5417a499a7226ace3a5cf139787c186d5d54336107298cacaad2b9+6
debiandebian/linux< linux 6.19.8-1 (forky)

🔴Vulnerability Details

3
GHSA
GHSA-x2vc-23cg-h9h7: In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Return the correct value in vmw_translate_ptr functions Before the r2026-03-25
OSV
CVE-2026-23317: In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Return the correct value in vmw_translate_ptr functions Before the ref2026-03-25
OSV
drm/vmwgfx: Return the correct value in vmw_translate_ptr functions2026-03-25

📋Vendor Advisories

3
Red Hat
kernel: drm/vmwgfx: Return the correct value in vmw_translate_ptr functions2026-03-25
Microsoft
drm/vmwgfx: Return the correct value in vmw_translate_ptr functions2026-03-10
Debian
CVE-2026-23317: linux - In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx:...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23317 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23317 — Linux vulnerability | cvebase