CVE-2023-53851
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's handling of DisplayPort (DP) auxiliary (aux) devices. Specifically, the issue arises because the aux devices are not properly depopulated together with the DP controller during error or unbind paths. This can lead to use-after-free errors when the panel device attempts to read EDID information, causing faults such as KASAN errors or invalid EDID data (all zeros). The fix involves explicitly depopulating the aux bus to prevent these use-after-free issues.
How can this vulnerability impact me? :
This vulnerability can cause system instability or crashes due to use-after-free errors in the DisplayPort auxiliary device handling. It may result in faulty display behavior, such as incorrect or missing EDID information, which can affect display detection and configuration. In rare cases, it could lead to kernel faults that impact system reliability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing indications such as EDID-hexdump logs full of zeros or rare KASAN faults related to use-after-free errors when the panel attempts to read EDID information. Specific commands are not provided in the available information.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves applying the patch that explicitly depopulates the aux bus in the error path and component unbind path to avoid use-after-free issues. No other specific mitigation steps are provided.