CVE-2023-53571NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: drm/i915: Make intel_get_crtc_new_encoder() less oopsy The point of the WARN was to print something, not oops straight up. Currently that is precisely what happens if we can't find the connector for the crtc in the atomic state. Get the dev pointer from the atomic state instead of the potentially NULL encoder to avoid that. (cherry picked from commit 3b6692357f70498f617ea1b31a0378070a0acf1c)

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.75.10.180+4
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linux3a47ae201e074945bbde0b088e4c1215c07f4d75780f303233c35eeb5132e3ee1cbc8f4cebe86dd2+6
debiandebian/linux< linux 6.1.37-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-r37f-5648-cmg6: In the Linux kernel, the following vulnerability has been resolved: drm/i915: Make intel_get_crtc_new_encoder() less oopsy The point of the WARN was2025-10-04
OSV
CVE-2023-53571: In the Linux kernel, the following vulnerability has been resolved: drm/i915: Make intel_get_crtc_new_encoder() less oopsy The point of the WARN was t2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: drm/i915: Make intel_get_crtc_new_encoder() less oopsy2025-10-04
Debian
CVE-2023-53571: linux - In the Linux kernel, the following vulnerability has been resolved: drm/i915: M...2023