CVE-2026-23317
Received Received - Intake
Use-After-Free in Linux drm/vmwgfx vmw_translate_ptr Functions

Publication date: 2026-03-25

Last updated on: 2026-04-23

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Return the correct value in vmw_translate_ptr functions Before the referenced fixes these functions used a lookup function that returned a pointer. This was changed to another lookup function that returned an error code with the pointer becoming an out parameter. The error path when the lookup failed was not changed to reflect this change and the code continued to return the PTR_ERR of the now uninitialized pointer. This could cause the vmw_translate_ptr functions to return success when they actually failed causing further uninitialized and OOB accesses.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-25
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2026-03-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 13 associated CPEs
Vendor Product Version / Range
linux linux_kernel 6.2
linux linux_kernel From 6.19 (inc) to 6.19.7 (exc)
linux linux_kernel 7.0
linux linux_kernel 7.0
linux linux_kernel 7.0
linux linux_kernel 7.0
linux linux_kernel 7.0
linux linux_kernel 7.0
linux linux_kernel 7.0
linux linux_kernel From 6.13 (inc) to 6.18.17 (exc)
linux linux_kernel From 6.7 (inc) to 6.12.77 (exc)
linux linux_kernel From 6.1.7 (inc) to 6.1.167 (exc)
linux linux_kernel From 6.2.1 (inc) to 6.6.130 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-908 The product uses or accesses a resource that has not been initialized.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's drm/vmwgfx component, specifically in the vmw_translate_ptr functions. Originally, these functions used a lookup function that returned a pointer. This was changed to a lookup function that returns an error code and uses a pointer as an out parameter. However, the error handling was not updated accordingly, causing the functions to sometimes return a success value even when the lookup failed. This leads to the use of uninitialized pointers and out-of-bounds (OOB) memory accesses.


How can this vulnerability impact me? :

The vulnerability can cause the vmw_translate_ptr functions to incorrectly indicate success despite failure, leading to uninitialized and out-of-bounds memory accesses. This can result in undefined behavior, potential system crashes, memory corruption, or security issues such as information disclosure or privilege escalation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart