๐Ÿ” CVE Alert

CVE-2026-23237

UNKNOWN 0.0

platform/x86: classmate-laptop: Add missing NULL pointer checks

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: platform/x86: classmate-laptop: Add missing NULL pointer checks In a few places in the Classmate laptop driver, code using the accel object may run before that object's address is stored in the driver data of the input device using it. For example, cmpc_accel_sensitivity_store_v4() is the "show" method of cmpc_accel_sensitivity_attr_v4 which is added in cmpc_accel_add_v4(), before calling dev_set_drvdata() for inputdev->dev. If the sysfs attribute is accessed prematurely, the dev_get_drvdata(&inputdev->dev) call in in cmpc_accel_sensitivity_store_v4() returns NULL which leads to a NULL pointer dereference going forward. Moreover, sysfs attributes using the input device are added before initializing that device by cmpc_add_acpi_notify_device() and if one of them is accessed before running that function, a NULL pointer dereference will occur. For example, cmpc_accel_sensitivity_attr_v4 is added before calling cmpc_add_acpi_notify_device() and if it is read prematurely, the dev_get_drvdata(&acpi->dev) call in cmpc_accel_sensitivity_show_v4() returns NULL which leads to a NULL pointer dereference going forward. Fix this by adding NULL pointer checks in all of the relevant places.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 4, 2026
Last Updated Mar 8, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
529aa8cb0a59367d08883f818e8c47028e819d0d < 993708fc18d0d0919db438361b4e8c1f980a8d1b 529aa8cb0a59367d08883f818e8c47028e819d0d < af673209d43b46257540997aba042b90ef3258c0 529aa8cb0a59367d08883f818e8c47028e819d0d < eb214804f03c829decf10998e9b7dd26f4c8ab9e 529aa8cb0a59367d08883f818e8c47028e819d0d < 9cf4b9b8ad09d6e05307abc4e951cabdff4be652 529aa8cb0a59367d08883f818e8c47028e819d0d < da6e06a5fdbabea3870d18c227734b5dea5b3be6 529aa8cb0a59367d08883f818e8c47028e819d0d < 97528b1622b8f129574d29a571c32a3c85eafa3c 529aa8cb0a59367d08883f818e8c47028e819d0d < fe747d7112283f47169e9c16e751179a9b38611e
Linux / Linux
2.6.33

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/993708fc18d0d0919db438361b4e8c1f980a8d1b git.kernel.org: https://git.kernel.org/stable/c/af673209d43b46257540997aba042b90ef3258c0 git.kernel.org: https://git.kernel.org/stable/c/eb214804f03c829decf10998e9b7dd26f4c8ab9e git.kernel.org: https://git.kernel.org/stable/c/9cf4b9b8ad09d6e05307abc4e951cabdff4be652 git.kernel.org: https://git.kernel.org/stable/c/da6e06a5fdbabea3870d18c227734b5dea5b3be6 git.kernel.org: https://git.kernel.org/stable/c/97528b1622b8f129574d29a571c32a3c85eafa3c git.kernel.org: https://git.kernel.org/stable/c/fe747d7112283f47169e9c16e751179a9b38611e