Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2285 articles · 106033 vulns · 38/41 feeds (7d)
← Back to list
5.5
CVE-2026-23237PATCHED
linux · linux_kernel

In the Linux kernel, the following vulnerability has been resolved: platform/x86: classmate-laptop: Add missing NULL pointer checks In a few places in the Classmate laptop driver, code using the acc

Description

In the Linux kernel, the following vulnerability has been resolved: platform/x86: classmate-laptop: Add missing NULL pointer checks In a few places in the Classmate laptop driver, code using the accel object may run before that object's address is stored in the driver data of the input device using it. For example, cmpc_accel_sensitivity_store_v4() is the "show" method of cmpc_accel_sensitivity_attr_v4 which is added in cmpc_accel_add_v4(), before calling dev_set_drvdata() for inputdev->dev. If the sysfs attribute is accessed prematurely, the dev_get_drvdata(&inputdev->dev) call in in cmpc_accel_sensitivity_store_v4() returns NULL which leads to a NULL pointer dereference going forward. Moreover, sysfs attributes using the input device are added before initializing that device by cmpc_add_acpi_notify_device() and if one of them is accessed before running that function, a NULL pointer dereference will occur. For example, cmpc_accel_sensitivity_attr_v4 is added before calling cmpc_add_acpi_notify_device() and if it is read prematurely, the dev_get_drvdata(&acpi->dev) call in cmpc_accel_sensitivity_show_v4() returns NULL which leads to a NULL pointer dereference going forward. Fix this by adding NULL pointer checks in all of the relevant places.

Affected Products

VendorProductVersions
linuxlinux_kernel< 5.10.251, < 5.15.201, < 6.1.164, < 6.6.127, < 6.12.74, < 6.18.13

References

  • https://git.kernel.org/stable/c/97528b1622b8f129574d29a571c32a3c85eafa3c(Patch)
  • https://git.kernel.org/stable/c/993708fc18d0d0919db438361b4e8c1f980a8d1b(Patch)
  • https://git.kernel.org/stable/c/9cf4b9b8ad09d6e05307abc4e951cabdff4be652(Patch)
  • https://git.kernel.org/stable/c/af673209d43b46257540997aba042b90ef3258c0(Patch)
  • https://git.kernel.org/stable/c/da6e06a5fdbabea3870d18c227734b5dea5b3be6(Patch)
  • https://git.kernel.org/stable/c/eb214804f03c829decf10998e9b7dd26f4c8ab9e(Patch)
  • https://git.kernel.org/stable/c/fe747d7112283f47169e9c16e751179a9b38611e(Patch)

Related News (1 articles)

Tier A
Microsoft MSRC1h ago
CVE-2026-23237 platform/x86: classmate-laptop: Add missing NULL pointer checks
→ No new info (linked only)
CVSS 3.15.5 MEDIUM
VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA KEV❌ No
Actively exploited❌ No
Patch availablehttps://git.kernel.org/stable/c/97528b1622b8f129574d29a571c32a3c85eafa3c, https://git.kernel.org/stable/c/993708fc18d0d0919db438361b4e8c1f980a8d1b, https://git.kernel.org/stable/c/9cf4b9b8ad09d6e05307abc4e951cabdff4be652, https://git.kernel.org/stable/c/af673209d43b46257540997aba042b90ef3258c0, https://git.kernel.org/stable/c/da6e06a5fdbabea3870d18c227734b5dea5b3be6, https://git.kernel.org/stable/c/eb214804f03c829decf10998e9b7dd26f4c8ab9e, https://git.kernel.org/stable/c/fe747d7112283f47169e9c16e751179a9b38611e
CWECWE-476
PublishedMar 4, 2026
Last enriched4d ago
Trending Score23
Source articles1
Independent1
Info Completeness8/14
Missing: epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-23269EXP
In the Linux kernel, the following vulnerability has been resolved: apparmor: validate DFA start states are in bounds in unpack_pdb Start states are read from untrusted data and used as indexes into
Trending: 67
CRITICALCVE-2026-23400EXP
rust_binder: call set_notification_done() without proc lock
Trending: 57
CRITICALCVE-2026-23399EXP
nf_tables: nft_dynset: fix possible stateful expression memleak in error path
Trending: 51
MEDIUMCVE-2026-22977
In the Linux kernel, the following vulnerability has been resolved: net: sock: fix hardened usercopy panic in sock_recv_errqueue skbuff_fclone_cache was created without defining a usercopy region, [
Trending: 32
NONECVE-2026-31788EXP
xen/privcmd: restrict usage in unprivileged domU
Trending: 28

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Mar 4, 2026
Patch Available
Mar 17, 2026
Discovered by ZDM
Mar 26, 2026