VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2023-53833

CVE-2023-53833

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Fix NULL ptr deref by checking new_crtc_state

intel_atomic_get_new_crtc_state can return NULL, unless crtc state wasn't obtained previously with intel_atomic_get_crtc_state, so we must check it for NULLness here, just as in many other places, where we can't guarantee that intel_atomic_get_crtc_state was called. We are currently getting NULL ptr deref because of that, so this fix was confirmed to help.

(cherry picked from commit 1d5b09f8daf859247a1ea65b0d732a24d88980d8)

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A NULL pointer dereference in the Linux kernel's drm/i915 driver could be triggered when intel_atomic_get_new_crtc_state returns NULL, confirmed to cause a crash.

Root

Cause

The vulnerability resides in the drm/i915 driver within the Linux kernel. The function intel_atomic_get_new_crtc_state can return a NULL pointer unless the corresponding CRTC state was previously obtained via intel_atomic_get_crtc_state. The code in question fails to check the return value for NULL before dereferencing it, leading to a NULL pointer dereference. This pattern of missing NULL checks has been identified and fixed in many similar locations within the driver [1].

Exploitation

An attacker would need to trigger a specific atomic modeset operation that causes intel_atomic_get_new_crtc_state to return NULL when the calling code does not expect it. The exact attack vector involves manipulating the display state in a way that bypasses prior calls to intel_atomic_get_crtc_state, likely requiring local access to the system or the ability to issue DRM IOCTLs. No authentication beyond normal user-space access to the DRM subsystem is mentioned in the sources.

Impact

Successful exploitation results in a NULL pointer dereference, which causes a kernel panic (denial of service). The description and patch note indicate that the issue was confirmed to cause a crash, but there is no indication of privilege escalation or data corruption. The impact is limited to system availability.

Mitigation

The fix has been applied to the Linux kernel stable tree (commit 1d5b09f8daf859247a1ea65b0d732a24d88980d8, also backported as commit a41d985902c153c31c616fe183cf2ee331e95ecb). Users should update their kernel to a version containing the patch. No workaround is mentioned; the vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.