CVE-2023-54122
Unknown Unknown - Not Provided
Null Pointer Dereference in Linux drm/msm/dpu Component

Publication date: 2025-12-24

Last updated on: 2025-12-24

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add check for cstate As kzalloc may fail and return NULL pointer, it should be better to check cstate in order to avoid the NULL pointer dereference in __drm_atomic_helper_crtc_reset. Patchwork: https://patchwork.freedesktop.org/patch/514163/
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-24
Last Modified
2025-12-24
Generated
2026-05-07
AI Q&A
2025-12-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a NULL pointer dereference in the Linux kernel's drm/msm/dpu component. Specifically, the function __drm_atomic_helper_crtc_reset did not properly check if the cstate pointer was NULL after a kzalloc memory allocation could fail. This could lead to a crash or instability when the kernel tries to dereference a NULL pointer.


How can this vulnerability impact me? :

If exploited or triggered, this vulnerability can cause the Linux kernel to crash or become unstable due to a NULL pointer dereference. This may lead to denial of service or system instability on affected devices using the drm/msm/dpu driver.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart