CVE-2026-23366Access of Uninitialized Pointer in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 94.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 25

Description

In the Linux kernel, the following vulnerability has been resolved: drm/client: Do not destroy NULL modes 'modes' in drm_client_modeset_probe may fail to kcalloc. If this occurs, we jump to 'out', calling modes_destroy on it, which dereferences it. This may result in a NULL pointer dereference in the error case. Prevent that.

Affected Packages4 packages

Linuxlinux/linux_kernel6.16.06.18.17+1
Debianlinux/linux_kernel< 6.19.8-1
CVEListV5linux/linux3039cc0c0653c6e15130a8719c3237329a9546704e3ca5f82346cc23c0a71f1ceb006115ff6b0745+3
debiandebian/linux< linux 6.19.8-1 (forky)

🔴Vulnerability Details

3
OSV
drm/client: Do not destroy NULL modes2026-03-25
GHSA
GHSA-m3rw-wqqm-pcwv: In the Linux kernel, the following vulnerability has been resolved: drm/client: Do not destroy NULL modes 'modes' in drm_client_modeset_probe may fa2026-03-25
OSV
CVE-2026-23366: In the Linux kernel, the following vulnerability has been resolved: drm/client: Do not destroy NULL modes 'modes' in drm_client_modeset_probe may fail2026-03-25

📋Vendor Advisories

2
Red Hat
kernel: drm/client: Do not destroy NULL modes2026-03-25
Debian
CVE-2026-23366: linux - In the Linux kernel, the following vulnerability has been resolved: drm/client:...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23366 Impact, Exploitability, and Mitigation Steps | Wiz