๐Ÿ” CVE Alert

CVE-2026-43236

UNKNOWN 0.0

drm/atmel-hlcdc: fix use-after-free of drm_crtc_commit after release

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/atmel-hlcdc: fix use-after-free of drm_crtc_commit after release The atmel_hlcdc_plane_atomic_duplicate_state() callback was copying the atmel_hlcdc_plane state structure without properly duplicating the drm_plane_state. In particular, state->commit remained set to the old state commit, which can lead to a use-after-free in the next drm_atomic_commit() call. Fix this by calling __drm_atomic_helper_duplicate_plane_state(), which correctly clones the base drm_plane_state (including the ->commit pointer). It has been seen when closing and re-opening the device node while another DRM client (e.g. fbdev) is still attached: ============================================================================= BUG kmalloc-64 (Not tainted): Poison overwritten ----------------------------------------------------------------------------- 0xc611b344-0xc611b344 @offset=836. First byte 0x6a instead of 0x6b FIX kmalloc-64: Restoring Poison 0xc611b344-0xc611b344=0x6b Allocated in drm_atomic_helper_setup_commit+0x1e8/0x7bc age=178 cpu=0 pid=29 drm_atomic_helper_setup_commit+0x1e8/0x7bc drm_atomic_helper_commit+0x3c/0x15c drm_atomic_commit+0xc0/0xf4 drm_framebuffer_remove+0x4cc/0x5a8 drm_mode_rmfb_work_fn+0x6c/0x80 process_one_work+0x12c/0x2cc worker_thread+0x2a8/0x400 kthread+0xc0/0xdc ret_from_fork+0x14/0x28 Freed in drm_atomic_helper_commit_hw_done+0x100/0x150 age=8 cpu=0 pid=169 drm_atomic_helper_commit_hw_done+0x100/0x150 drm_atomic_helper_commit_tail+0x64/0x8c commit_tail+0x168/0x18c drm_atomic_helper_commit+0x138/0x15c drm_atomic_commit+0xc0/0xf4 drm_atomic_helper_set_config+0x84/0xb8 drm_mode_setcrtc+0x32c/0x810 drm_ioctl+0x20c/0x488 sys_ioctl+0x14c/0xc20 ret_fast_syscall+0x0/0x54 Slab 0xef8bc360 objects=21 used=16 fp=0xc611b7c0 flags=0x200(workingset|zone=0) Object 0xc611b340 @offset=832 fp=0xc611b7c0

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 6, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < fd4a4d0711f48a99b25bcd45e00eef8339eff82d 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 6404898af86d986db1dbbe06177c143e40652e49 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 796e77c14c4c1e2cd36473760fb6cc66c695eb47 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < ac2d898da5095d46bd1ff8585fdd753d58ad91e7 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < a205740a7231e967ac77cb731171642901c327af 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 7b4d0fab3ff2c00c6d34e1952c9df5129a826aee 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 549c6db503dbb85dbff4840830971853feac6625 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < bc847787233277a337788568e90a6ee1557595eb
Linux / Linux
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/fd4a4d0711f48a99b25bcd45e00eef8339eff82d git.kernel.org: https://git.kernel.org/stable/c/6404898af86d986db1dbbe06177c143e40652e49 git.kernel.org: https://git.kernel.org/stable/c/796e77c14c4c1e2cd36473760fb6cc66c695eb47 git.kernel.org: https://git.kernel.org/stable/c/ac2d898da5095d46bd1ff8585fdd753d58ad91e7 git.kernel.org: https://git.kernel.org/stable/c/a205740a7231e967ac77cb731171642901c327af git.kernel.org: https://git.kernel.org/stable/c/7b4d0fab3ff2c00c6d34e1952c9df5129a826aee git.kernel.org: https://git.kernel.org/stable/c/549c6db503dbb85dbff4840830971853feac6625 git.kernel.org: https://git.kernel.org/stable/c/bc847787233277a337788568e90a6ee1557595eb