CVE-2023-53284NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 16

Description

In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: check for null return of devm_kzalloc() in dpu_writeback_init() Because of the possilble failure of devm_kzalloc(), dpu_wb_conn might be NULL and will cause null pointer dereference later. Therefore, it might be better to check it and directly return -ENOMEM. Patchwork: https://patchwork.freedesktop.org/patch/512277/ [DB: fixed typo in commit message]

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.196.1.16+1
Debianlinux/linux_kernel< 6.1.20-1+2
CVEListV5linux/linux77b001acdcfeb892842caac49fb7f0d286b29c433723c4dbcd14cc96771000ce0b0540801e6ba059+3
debiandebian/linux< linux 6.1.20-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-vp8c-vqq5-23j3: In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: check for null return of devm_kzalloc() in dpu_writeback_init() Bec2025-09-16
OSV
CVE-2023-53284: In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: check for null return of devm_kzalloc() in dpu_writeback_init() Becau2025-09-16

📋Vendor Advisories

2
Red Hat
kernel: drm/msm/dpu: check for null return of devm_kzalloc() in dpu_writeback_init()2025-09-16
Debian
CVE-2023-53284: linux - In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu...2023
CVE-2023-53284 — NULL Pointer Dereference in Linux | cvebase