VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54018

CVE-2023-54018

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/hdmi: Add missing check for alloc_ordered_workqueue

Add check for the return value of alloc_ordered_workqueue as it may return NULL pointer and cause NULL pointer dereference in hdmi_hdcp.c and hdmi_hpd.c.

Patchwork: https://patchwork.freedesktop.org/patch/517211/

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's DRM MSM HDMI driver, missing validation of alloc_ordered_workqueue return can cause NULL pointer dereference in HDCP/HPD handling.

The vulnerability resides in the Linux kernel's DRM subsystem for MSM (Qualcomm Snapdragon) HDMI hardware. The function alloc_ordered_workqueue can return a NULL pointer if memory allocation fails. In the HDMI driver's HDCP and HPD paths, the return value was not checked before using the workqueue, leading to a potential NULL pointer dereference [1][2][3].

Exploitation

An attacker would need to trigger a memory allocation failure for the workqueue, possibly by exhausting system memory or through other resource starvation. The bug is reachable when the HDMI display is active and HDCP or hot-plug detection events occur. No special privileges beyond local access are required, as the driver is exposed through the kernel's DRM interface [1].

Impact

A successful exploit could cause a kernel NULL pointer dereference, leading to a denial of service (system crash or hang). In some configurations, this may also allow privilege escalation if the attacker can control the dereferenced memory, though the patch description focuses on the crash scenario [1].

Mitigation

The fix adds a proper check for the return value of alloc_ordered_workqueue and gracefully handles the failure by returning an error. The patch has been applied to the stable kernel trees [2][3]. Users should update to a kernel containing this fix (e.g., Linux 6.7 and later). As of 2025-12-24, the CVE is not listed on CISA's Known Exploited Vulnerabilities catalog.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.