CVE-2026-23237
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
04/03/2026
Last modified:
17/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
platform/x86: classmate-laptop: Add missing NULL pointer checks<br />
<br />
In a few places in the Classmate laptop driver, code using the accel<br />
object may run before that object&#39;s address is stored in the driver<br />
data of the input device using it.<br />
<br />
For example, cmpc_accel_sensitivity_store_v4() is the "show" method<br />
of cmpc_accel_sensitivity_attr_v4 which is added in cmpc_accel_add_v4(),<br />
before calling dev_set_drvdata() for inputdev->dev. If the sysfs<br />
attribute is accessed prematurely, the dev_get_drvdata(&inputdev->dev)<br />
call in in cmpc_accel_sensitivity_store_v4() returns NULL which<br />
leads to a NULL pointer dereference going forward.<br />
<br />
Moreover, sysfs attributes using the input device are added before<br />
initializing that device by cmpc_add_acpi_notify_device() and if one<br />
of them is accessed before running that function, a NULL pointer<br />
dereference will occur.<br />
<br />
For example, cmpc_accel_sensitivity_attr_v4 is added before calling<br />
cmpc_add_acpi_notify_device() and if it is read prematurely, the<br />
dev_get_drvdata(&acpi->dev) call in cmpc_accel_sensitivity_show_v4()<br />
returns NULL which leads to a NULL pointer dereference going forward.<br />
<br />
Fix this by adding NULL pointer checks in all of the relevant places.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.33.1 (including) | 5.10.251 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.201 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.164 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.127 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.74 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:2.6.33:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.33:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.33:rc8:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/97528b1622b8f129574d29a571c32a3c85eafa3c
- https://git.kernel.org/stable/c/993708fc18d0d0919db438361b4e8c1f980a8d1b
- https://git.kernel.org/stable/c/9cf4b9b8ad09d6e05307abc4e951cabdff4be652
- https://git.kernel.org/stable/c/af673209d43b46257540997aba042b90ef3258c0
- https://git.kernel.org/stable/c/da6e06a5fdbabea3870d18c227734b5dea5b3be6
- https://git.kernel.org/stable/c/eb214804f03c829decf10998e9b7dd26f4c8ab9e
- https://git.kernel.org/stable/c/fe747d7112283f47169e9c16e751179a9b38611e



