CVE-2023-54122Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add check for cstate As kzalloc may fail and return NULL pointer, it should be better to check cstate in order to avoid the NULL pointer dereference in __drm_atomic_helper_crtc_reset. Patchwork: https://patchwork.freedesktop.org/patch/514163/

Affected Packages4 packages

Linuxlinux/linux_kernel5.3.05.4.235+4
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux1cff7440a86e04a613665803b42034c467f035faa6afb8293ec0932f4ed0b7aecfc0ccc00f44dc2b+6
debiandebian/linux< linux 6.1.20-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-54122: In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add check for cstate As kzalloc may fail and return NULL pointer, it2025-12-24
OSV
drm/msm/dpu: Add check for cstate2025-12-24
GHSA
GHSA-74cv-3gqc-87fm: In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add check for cstate As kzalloc may fail and return NULL pointer, i2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: drm/msm/dpu: Add check for cstate2025-12-24
Debian
CVE-2023-54122: linux - In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54122 Impact, Exploitability, and Mitigation Steps | Wiz