CVE-2026-23227
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
18/02/2026
Last modified:
02/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free<br />
<br />
Exynos Virtual Display driver performs memory alloc/free operations<br />
without lock protection, which easily causes concurrency problem.<br />
<br />
For example, use-after-free can occur in race scenario like this:<br />
```<br />
CPU0 CPU1 CPU2<br />
---- ---- ----<br />
vidi_connection_ioctl()<br />
if (vidi->connection) // true<br />
drm_edid = drm_edid_alloc(); // alloc drm_edid<br />
...<br />
ctx->raw_edid = drm_edid;<br />
...<br />
drm_mode_getconnector()<br />
drm_helper_probe_single_connector_modes()<br />
vidi_get_modes()<br />
if (ctx->raw_edid) // true<br />
drm_edid_dup(ctx->raw_edid);<br />
if (!drm_edid) // false<br />
...<br />
vidi_connection_ioctl()<br />
if (vidi->connection) // false<br />
drm_edid_free(ctx->raw_edid); // free drm_edid<br />
...<br />
drm_edid_alloc(drm_edid->edid)<br />
kmemdup(edid); // UAF!!<br />
...<br />
```<br />
<br />
To prevent these vulns, at least in vidi_context, member variables related<br />
to memory alloc/free should be protected with ctx->lock.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.6 (including) | 6.12.77 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0cd2c155740dbd00868ac5a8ae5d14cd6b9ed385
- https://git.kernel.org/stable/c/1b24d3e8792bcc050c70e8e0dea6b49c4fc63b13
- https://git.kernel.org/stable/c/52b330799e2d6f825ae2bb74662ec1b10eb954bb
- https://git.kernel.org/stable/c/60b75407c172e1f341a8a5097c5cbc97dbbdd893
- https://git.kernel.org/stable/c/92dd1f38d7db75374dcdaf54f1d79d67bffd54e5
- https://git.kernel.org/stable/c/abfdf449fb3d7b42e85a1ad1c8694b768b1582f4



