CVE-2023-54018
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/hdmi: Add missing check for alloc_ordered_workqueue
Add check for the return value of alloc_ordered_workqueue as it may return NULL pointer and cause NULL pointer dereference in hdmi_hdcp.c and hdmi_hpd.c.
Patchwork: https://patchwork.freedesktop.org/patch/517211/
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's DRM MSM HDMI driver, missing validation of alloc_ordered_workqueue return can cause NULL pointer dereference in HDCP/HPD handling.
The vulnerability resides in the Linux kernel's DRM subsystem for MSM (Qualcomm Snapdragon) HDMI hardware. The function alloc_ordered_workqueue can return a NULL pointer if memory allocation fails. In the HDMI driver's HDCP and HPD paths, the return value was not checked before using the workqueue, leading to a potential NULL pointer dereference [1][2][3].
Exploitation
An attacker would need to trigger a memory allocation failure for the workqueue, possibly by exhausting system memory or through other resource starvation. The bug is reachable when the HDMI display is active and HDCP or hot-plug detection events occur. No special privileges beyond local access are required, as the driver is exposed through the kernel's DRM interface [1].
Impact
A successful exploit could cause a kernel NULL pointer dereference, leading to a denial of service (system crash or hang). In some configurations, this may also allow privilege escalation if the attacker can control the dereferenced memory, though the patch description focuses on the crash scenario [1].
Mitigation
The fix adds a proper check for the return value of alloc_ordered_workqueue and gracefully handles the failure by returning an error. The patch has been applied to the stable kernel trees [2][3]. Users should update to a kernel containing this fix (e.g., Linux 6.7 and later). As of 2025-12-24, the CVE is not listed on CISA's Known Exploited Vulnerabilities catalog.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
8392f7eb3946afc34608fa2751bab31a0969c9a01ecc312e7e55f93d67431ae5ca116a0c0afe4cb96153ab479485b24daVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/1bab31a0969ca4ac90907a5d3b44af104229eafdnvd
- git.kernel.org/stable/c/392f7eb3946ab3780b931af723033e19f82c9134nvd
- git.kernel.org/stable/c/9a01ecc312e764ec4527ad49105a3ca799f1860cnvd
- git.kernel.org/stable/c/ae5ca116a0c0ba9fc4123b1f1ec3c4f4d0d01b3fnvd
- git.kernel.org/stable/c/afe4cb96153a0d8003e4e4ebd91b5c543e10df84nvd
- git.kernel.org/stable/c/b479485b24da1d572a0ce875537af31b02d2f915nvd
- git.kernel.org/stable/c/e55f93d674314f2fb69eba0dc24acfdf72805611nvd
- git.kernel.org/stable/c/fc34608fa275fe6b3b17e171b63b8ca3aa1cbf09nvd
News mentions
0No linked articles in our index yet.