CVE-2026-23467
NULL Pointer Dereference in Linux i915 DRM Causes Kernel Oops
Publication date: 2026-04-03
Last updated on: 2026-04-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| intel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel's Intel graphics driver (drm/i915/dmc). It occurs when the function intel_dmc_update_dc6_allowed_count() is called before the DMC (Display Microcontroller) has been initialized, causing a NULL pointer to be dereferenced and leading to a kernel oops (crash).
The issue arises because intel_power_domains_init_hw() is called before intel_dmc_init(), but intel_dmc_update_dc6_allowed_count() can be called conditionally depending on the DC (Display Core) power states. If DC6 (a low power state) is enabled at probe time without the DMC firmware being loaded by the BIOS, the function is called with a NULL dmc pointer, causing the crash.
This situation is unlikely because enabling DC6 at boot without loading the DMC firmware is not typical BIOS behavior. The fix involves tracking the DC6 allowed counter using the software DC6 state rather than the hardware DC6 state to avoid the NULL pointer dereference.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel oops) during the initialization of the Intel graphics driver if the DC6 power state is enabled at probe time without proper DMC firmware initialization.
Such a crash can lead to system instability, unexpected reboots, or loss of data if the kernel becomes unresponsive or crashes during normal operation.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by a patch in the Linux kernel that corrects the handling of the DC6 state tracking in the Intel DRM i915 driver. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix.
Since the issue involves a NULL pointer dereference in the intel_dmc_update_dc6_allowed_count() function, which occurs when the DMC firmware is not properly initialized, ensuring your BIOS and firmware are up to date may also help prevent this condition.
In summary, the immediate mitigation steps are:
- Update the Linux kernel to a version containing the fix for this vulnerability.
- Verify that your system BIOS is updated and properly loads the DMC firmware.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
There is no information available in the provided context or resources about how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.