CVE-2023-54217
NULL Pointer Dereference in Linux Kernel msm_drm Workqueue Handling
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a problematic patch in the Linux kernel's drm/msm driver. The patch intended to fix workqueue handling in msm_drm_init() but introduced issues such as NULL-pointer dereferences due to uninitialized pointers during error handling, and memory leaks from allocation sanity checks. The faulty patch was reverted to allow for proper fixes to be developed.
How can this vulnerability impact me? :
The vulnerability can cause system instability or crashes due to NULL-pointer dereferences and resource leaks in the drm/msm driver. This may affect the reliability of the system, potentially leading to denial of service or degraded performance.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to revert the problematic commit (commit 643b7d0869cc7f1f7a5ac7ca6bd25d88f54e31d0) in the Linux kernel, as was done in the patch. This will restore the previous stable state and allow for clean and backportable fixes to be applied later.