CVE-2023-53352
BaseFortify
Publication date: 2025-09-17
Last updated on: 2025-12-11
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.124 (inc) to 5.15.126 (exc) |
| linux | linux_kernel | From 6.1.43 (inc) to 6.1.45 (exc) |
| linux | linux_kernel | From 6.4.8 (inc) to 6.4.10 (exc) |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a null pointer dereference issue in the Linux kernel's drm/ttm component. It occurs when the code attempts to access a null pointer during memory swapping operations, which can cause a general protection fault and potentially crash the system. The fix involves adding a check to ensure the pointer is not null before accessing it.
How can this vulnerability impact me? :
This vulnerability can lead to system crashes or instability due to null pointer dereference in the Linux kernel's graphics memory management subsystem. This could result in denial of service or unexpected behavior in systems using affected kernel versions.