CVE-2026-23227

Source
https://cve.org/CVERecord?id=CVE-2026-23227
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23227.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23227
Downstream
Published
2026-02-18T14:53:30.784Z
Modified
2026-03-15T13:48:06.522083Z
Summary
drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free

Exynos Virtual Display driver performs memory alloc/free operations without lock protection, which easily causes concurrency problem.

For example, use-after-free can occur in race scenario like this:

    CPU0                CPU1                CPU2
    ----                ----                ----
  vidi_connection_ioctl()
    if (vidi->connection) // true
      drm_edid = drm_edid_alloc(); // alloc drm_edid
      ...
      ctx->raw_edid = drm_edid;
      ...
                                drm_mode_getconnector()
                                  drm_helper_probe_single_connector_modes()
                                    vidi_get_modes()
                                      if (ctx->raw_edid) // true
                                        drm_edid_dup(ctx->raw_edid);
                                          if (!drm_edid) // false
                                          ...
                vidi_connection_ioctl()
                  if (vidi->connection) // false
                    drm_edid_free(ctx->raw_edid); // free drm_edid
                    ...
                                          drm_edid_alloc(drm_edid->edid)
                                            kmemdup(edid); // UAF!!
                                            ...

To prevent these vulns, at least in vidi_context, member variables related to memory alloc/free should be protected with ctx->lock.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23227.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d3b62dbfc7b9bb013926f56db79b60f6c18c392f
Fixed
abfdf449fb3d7b42e85a1ad1c8694b768b1582f4
Fixed
60b75407c172e1f341a8a5097c5cbc97dbbdd893
Fixed
0cd2c155740dbd00868ac5a8ae5d14cd6b9ed385
Fixed
52b330799e2d6f825ae2bb74662ec1b10eb954bb

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23227.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.6.0
Fixed
6.12.77
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.11
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23227.json"