0.0
NA
CVE-2026-43123
fbcon: check return value of con2fb_acquire_newinfo()
Description

In the Linux kernel, the following vulnerability has been resolved: fbcon: check return value of con2fb_acquire_newinfo() If fbcon_open() fails when called from con2fb_acquire_newinfo() then info->fbcon_par pointer remains NULL which is later dereferenced. Add check for return value of the function con2fb_acquire_newinfo() to avoid it. Found by Linux Verification Center (linuxtesting.org) with SVACE.

INFO

Published Date :

May 6, 2026, 12:16 p.m.

Last Modified :

May 6, 2026, 1:07 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2026-43123 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
Solution
Check the return value of con2fb_acquire_newinfo() in fbcon to prevent NULL pointer dereference.
  • Ensure con2fb_acquire_newinfo() return value is checked.
  • Prevent NULL pointer dereference in fbcon_open().
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2026-43123 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2026-43123 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2026-43123 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2026-43123 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    May. 06, 2026

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: fbcon: check return value of con2fb_acquire_newinfo() If fbcon_open() fails when called from con2fb_acquire_newinfo() then info->fbcon_par pointer remains NULL which is later dereferenced. Add check for return value of the function con2fb_acquire_newinfo() to avoid it. Found by Linux Verification Center (linuxtesting.org) with SVACE.
    Added Reference https://git.kernel.org/stable/c/011a0502801c8536f64141a2b61362c14f456544
    Added Reference https://git.kernel.org/stable/c/0b038c0be6827dd2dbb1ce4f8d92d97c80cbe9cc
    Added Reference https://git.kernel.org/stable/c/11a93180a70bb3095a9bd80d113d9277e30d9959
    Added Reference https://git.kernel.org/stable/c/3b5a754ec86bc6064af9aca76eb191c2405e6b0c
    Added Reference https://git.kernel.org/stable/c/a785c4e2a999c2d51dfcf40d317cfb30cc735d2c
    Added Reference https://git.kernel.org/stable/c/d3e535533767c85788529e626478718b7e95a59f
    Added Reference https://git.kernel.org/stable/c/f57b61624c86ef8f87f6e6b7dd0755de03d90e89
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.