Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1770 articles · 103891 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-23467EXPLOITEDPATCHED
linux · linux kernel

drm/i915/dmc: Fix an unlikely NULL pointer deference at probe

Description

In the Linux kernel, the following vulnerability has been resolved: drm/i915/dmc: Fix an unlikely NULL pointer deference at probe intel_dmc_update_dc6_allowed_count() oopses when DMC hasn't been initialized, and dmc is thus NULL. That would be the case when the call path is intel_power_domains_init_hw() -> {skl,bxt,icl}_display_core_init() -> gen9_set_dc_state() -> intel_dmc_update_dc6_allowed_count(), as intel_power_domains_init_hw() is called *before* intel_dmc_init(). However, gen9_set_dc_state() calls intel_dmc_update_dc6_allowed_count() conditionally, depending on the current and target DC states. At probe, the target is disabled, but if DC6 is enabled, the function is called, and an oops follows. Apparently it's quite unlikely that DC6 is enabled at probe, as we haven't seen this failure mode before. It is also strange to have DC6 enabled at boot, since that would require the DMC firmware (loaded by BIOS); the BIOS loading the DMC firmware and the driver stopping / reprogramming the firmware is a poorly specified sequence and as such unlikely an intentional BIOS behaviour. It's more likely that BIOS is leaving an unintentionally enabled DC6 HW state behind (without actually loading the required DMC firmware for this). The tracking of the DC6 allowed counter only works if starting / stopping the counter depends on the _SW_ DC6 state vs. the current _HW_ DC6 state (since stopping the counter requires the DC5 counter captured when the counter was started). Thus, using the HW DC6 state is incorrect and it also leads to the above oops. Fix both issues by using the SW DC6 state for the tracking. This is v2 of the fix originally sent by Jani, updated based on the first Link: discussion below. (cherry picked from commit 2344b93af8eb5da5d496b4e0529d35f0f559eaf0)

Affected Products

VendorProductVersions
linuxlinux kernel88c1f9a4d36de61f87cc52aac670020b13d1ccaa, 88c1f9a4d36de61f87cc52aac670020b13d1ccaa, 88c1f9a4d36de61f87cc52aac670020b13d1ccaa, 6.16, 6.18.20, 6.19.10, 7.0-rc5, 6.18.19, 6.19.9, 7.0-rc4

References

  • https://git.kernel.org/stable/c/0b35d11fbbcfd1079c8489282a341944228835e3
  • https://git.kernel.org/stable/c/631317825d44283abfe7a8374f13a76ce2032bb8
  • https://git.kernel.org/stable/c/ac57eb3b7d2ad649025b5a0fa207315f755ac4f6

Related News (2 articles)

Tier C
VulDB5h ago
CVE-2026-23467 | Linux Kernel up to 6.18.19/6.19.9/7.0-rc4 i915 intel_dmc_update_dc6_allowed_count null pointer dereference
→ No new info (linked only)
Tier C
Linux Kernel CVEs5h ago
CVE-2026-23467: drm/i915/dmc: Fix an unlikely NULL pointer deference at probe
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
0b35d11fbbcfd1079c8489282a341944228835e3631317825d44283abfe7a8374f13a76ce2032bb8ac57eb3b7d2ad649025b5a0fa207315f755ac4f606.18.206.19.107.0-rc5
CWECWE-476
PublishedApr 3, 2026
Last enriched4h agov3
Trending Score60
Source articles2
Independent2
Info Completeness9/14
Missing: cvss, epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-23461EXP
Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user
Trending: 60
CRITICALCVE-2026-23475EXP
spi: fix statistics allocation
Trending: 60
CRITICALCVE-2026-23452EXP
PM: runtime: Fix a race condition related to device removal
Trending: 60
CRITICALCVE-2026-23443EXP
ACPI: processor: Fix previous acpi_processor_errata_piix4() fix
Trending: 60
CRITICALCVE-2026-23427EXP
ksmbd: fix use-after-free in durable v2 replay of active file handles
Trending: 60

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 3, 2026
Actively Exploited
Apr 3, 2026
Exploit Available
Apr 3, 2026
Patch Available
Apr 3, 2026
Discovered by ZDM
Apr 3, 2026
Updated: description, affectedVersions, severity, cweIds, exploitAvailable, activelyExploited
Apr 3, 2026
Updated: severity, affectedVersions
Apr 3, 2026

Version History

v3
Last enriched 4h ago
v3Tier C4h ago

Updated severity to CRITICAL, added new affected versions, and noted that no exploit is available.

severityaffectedVersions
via VulDB
v2Tier C5h ago

Updated description with more technical detail, added affected versions 6.18.20, 6.19.10, and 7.0-rc5, changed severity to HIGH, added CWE-476, and marked exploit as available and actively exploited.

descriptionaffectedVersionsseveritycweIdsexploitAvailableactivelyExploited
via Linux Kernel CVEs
v15h ago

Initial creation