CVE-2023-53991
Null Pointer Dereference in Linux drm/msm/dpu Resource Handling
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's drm/msm/dpu component involves the system returning unallocated resources (specifically DSC blocks) as NULL pointers when the topology requests resources that have not been created. The function dpu_rm_get_assigned_resources returns an array expected to contain valid pointers, but instead returns NULLs. This can lead to null-pointer dereferences causing hard-to-debug platform lockups. The fix ensures that the number of blocks (num_blks) does not increase past NULL blocks, printing an error and breaking instead.
How can this vulnerability impact me? :
This vulnerability can cause platform lockups due to null-pointer dereferences when unallocated resources are returned as NULL pointers. This can lead to system instability and potentially disrupt normal operation of devices relying on the affected Linux kernel component.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that resolves the issue in the Linux kernel drm/msm/dpu component, which disallows unallocated resources to be returned and prevents null-pointer dereferences causing platform lockups. This involves updating the Linux kernel to a version that includes the fix described in the patchwork link: https://patchwork.freedesktop.org/patch/517636/.