CVE-2023-54122
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dpu: Add check for cstate
As kzalloc may fail and return NULL pointer, it should be better to check cstate in order to avoid the NULL pointer dereference in __drm_atomic_helper_crtc_reset.
Patchwork: https://patchwork.freedesktop.org/patch/514163/
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A missing NULL pointer check in the MSM DPU driver's kzalloc call could lead to a NULL pointer dereference in the Linux kernel.
Root
Cause
The vulnerability resides in the MSM Display Processing Unit (DPU) driver within the Linux kernel. The function drm/msm/dpu allocates memory via kzalloc for a cstate structure but does not verify if the allocation succeeded. If kzalloc fails and returns a NULL pointer, the subsequent call to __drm_atomic_helper_crtc_reset will dereference this NULL pointer, leading to a kernel crash or potential exploitation [1][2].
Exploitation
An attacker would need to trigger a memory allocation failure in the kernel, which can be achieved by exhausting system memory or through other resource exhaustion techniques. No special privileges are required beyond the ability to trigger a DRM atomic commit operation that invokes the vulnerable code path. The attack surface is local, as the DRM subsystem is accessible to users with access to the graphics device.
Impact
Successful exploitation results in a NULL pointer dereference, causing a kernel panic (denial of service). In some configurations, this could potentially be leveraged for privilege escalation if the attacker can control the dereferenced memory, though the kernel's memory management, though the primary impact is system instability.
Mitigation
The fix adds a NULL check after kzalloc and returns an appropriate error code if allocation fails. The patch has been applied to the stable kernel branches as referenced in [1] and [2]. Users should update their kernels to include this commit.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
6a6afb8293ec031f2f8de0ea7d4ba50614cb342442d42c57ba52e5a002d18c96988b7d993Vulnerability mechanics
Synthesis attempt was rejected by the grounding validator. Re-run pending.
References
6- git.kernel.org/stable/c/31f2f8de0ea7387cde18a24f94ba5e0b886b9842nvd
- git.kernel.org/stable/c/42442d42c57b9fbc35cb5ef72c7e5347c5f7d082nvd
- git.kernel.org/stable/c/a52e5a002d18bffabff66f6f59a74f8e9aac5afenvd
- git.kernel.org/stable/c/a6afb8293ec0932f4ed0b7aecfc0ccc00f44dc2bnvd
- git.kernel.org/stable/c/c96988b7d99327bb08bd9efd29a203b22cd88acenvd
- git.kernel.org/stable/c/d4ba50614cb3f0686bbdb505af685d78e75861dcnvd
News mentions
0No linked articles in our index yet.