๐Ÿ” CVE Alert

CVE-2026-23227

HIGH 7.8

drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free Exynos Virtual Display driver performs memory alloc/free operations without lock protection, which easily causes concurrency problem. For example, use-after-free can occur in race scenario like this: ``` CPU0 CPU1 CPU2 ---- ---- ---- vidi_connection_ioctl() if (vidi->connection) // true drm_edid = drm_edid_alloc(); // alloc drm_edid ... ctx->raw_edid = drm_edid; ... drm_mode_getconnector() drm_helper_probe_single_connector_modes() vidi_get_modes() if (ctx->raw_edid) // true drm_edid_dup(ctx->raw_edid); if (!drm_edid) // false ... vidi_connection_ioctl() if (vidi->connection) // false drm_edid_free(ctx->raw_edid); // free drm_edid ... drm_edid_alloc(drm_edid->edid) kmemdup(edid); // UAF!! ... ``` To prevent these vulns, at least in vidi_context, member variables related to memory alloc/free should be protected with ctx->lock.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 18, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Linux / Linux
d3b62dbfc7b9bb013926f56db79b60f6c18c392f < 92dd1f38d7db75374dcdaf54f1d79d67bffd54e5 d3b62dbfc7b9bb013926f56db79b60f6c18c392f < 1b24d3e8792bcc050c70e8e0dea6b49c4fc63b13 d3b62dbfc7b9bb013926f56db79b60f6c18c392f < abfdf449fb3d7b42e85a1ad1c8694b768b1582f4 d3b62dbfc7b9bb013926f56db79b60f6c18c392f < 60b75407c172e1f341a8a5097c5cbc97dbbdd893 d3b62dbfc7b9bb013926f56db79b60f6c18c392f < 0cd2c155740dbd00868ac5a8ae5d14cd6b9ed385 d3b62dbfc7b9bb013926f56db79b60f6c18c392f < 52b330799e2d6f825ae2bb74662ec1b10eb954bb
Linux / Linux
3.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/92dd1f38d7db75374dcdaf54f1d79d67bffd54e5 git.kernel.org: https://git.kernel.org/stable/c/1b24d3e8792bcc050c70e8e0dea6b49c4fc63b13 git.kernel.org: https://git.kernel.org/stable/c/abfdf449fb3d7b42e85a1ad1c8694b768b1582f4 git.kernel.org: https://git.kernel.org/stable/c/60b75407c172e1f341a8a5097c5cbc97dbbdd893 git.kernel.org: https://git.kernel.org/stable/c/0cd2c155740dbd00868ac5a8ae5d14cd6b9ed385 git.kernel.org: https://git.kernel.org/stable/c/52b330799e2d6f825ae2bb74662ec1b10eb954bb