VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54122

CVE-2023-54122

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: Add check for cstate

As kzalloc may fail and return NULL pointer, it should be better to check cstate in order to avoid the NULL pointer dereference in __drm_atomic_helper_crtc_reset.

Patchwork: https://patchwork.freedesktop.org/patch/514163/

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing NULL pointer check in the MSM DPU driver's kzalloc call could lead to a NULL pointer dereference in the Linux kernel.

Root

Cause

The vulnerability resides in the MSM Display Processing Unit (DPU) driver within the Linux kernel. The function drm/msm/dpu allocates memory via kzalloc for a cstate structure but does not verify if the allocation succeeded. If kzalloc fails and returns a NULL pointer, the subsequent call to __drm_atomic_helper_crtc_reset will dereference this NULL pointer, leading to a kernel crash or potential exploitation [1][2].

Exploitation

An attacker would need to trigger a memory allocation failure in the kernel, which can be achieved by exhausting system memory or through other resource exhaustion techniques. No special privileges are required beyond the ability to trigger a DRM atomic commit operation that invokes the vulnerable code path. The attack surface is local, as the DRM subsystem is accessible to users with access to the graphics device.

Impact

Successful exploitation results in a NULL pointer dereference, causing a kernel panic (denial of service). In some configurations, this could potentially be leveraged for privilege escalation if the attacker can control the dereferenced memory, though the kernel's memory management, though the primary impact is system instability.

Mitigation

The fix adds a NULL check after kzalloc and returns an appropriate error code if allocation fails. The patch has been applied to the stable kernel branches as referenced in [1] and [2]. Users should update their kernels to include this commit.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

6

Vulnerability mechanics

Synthesis attempt was rejected by the grounding validator. Re-run pending.

References

6

News mentions

0

No linked articles in our index yet.