CVE-2023-54047
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/rockchip: dw_hdmi: cleanup drm encoder during unbind
This fixes a use-after-free crash during rmmod.
The DRM encoder is embedded inside the larger rockchip_hdmi, which is allocated with the component. The component memory gets freed before the main drm device is destroyed. Fix it by running encoder cleanup before tearing down its container.
[moved encoder cleanup above clk_disable, similar to bind-error-path]
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Use-after-free in Linux kernel drm/rockchip dw_hdmi driver due to improper encoder cleanup order during unbind, leading to potential memory corruption.
Vulnerability
A use-after-free vulnerability exists in the Linux kernel's drm/rockchip dw_hdmi driver. The DRM encoder is embedded within the rockchip_hdmi structure, which is allocated as part of a component. During unbind (e.g., when removing the module), the component memory is freed before the main DRM device is destroyed, allowing access to freed memory [1].
Exploitation
To exploit this, an attacker would need to trigger the unbind operation, such as by running rmmod on the driver or through hot-unplug events. This typically requires local access to the system and the ability to load/unload kernel modules. No special privileges beyond local user access are mentioned, but the attack surface is limited to systems using the Rockchip DRM driver.
Impact
A use-after-free in kernel memory can lead to system crashes (denial of service) or potentially allow an attacker to execute arbitrary code with kernel privileges. The specific impact depends on the attacker's ability to control the freed memory contents.
Mitigation
The fix is included in the Linux kernel stable tree, as referenced in the commit that moves encoder cleanup above clock disabling, similar to the bind-error path [1]. Users are advised to update their kernels to include this patch.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
3110d42025223218fe9b62454b5af48eedcb5Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.