Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: check for null return of devm_kzalloc() in dpu_writeback_init() Because of the possilble failure of devm_kzalloc(), dpu_wb_conn might be NULL and will cause null pointer dereference later. Therefore, it might be better to check it and directly return -ENOMEM. Patchwork: https://patchwork.freedesktop.org/patch/512277/ [DB: fixed typo in commit message]

PUBLISHED Reserved 2025-09-16 | Published 2025-09-16 | Updated 2025-09-16 | Assigner Linux

Product status

Default status
unaffected

77b001acdcfeb892842caac49fb7f0d286b29c43 (git) before 3723c4dbcd14cc96771000ce0b0540801e6ba059
affected

77b001acdcfeb892842caac49fb7f0d286b29c43 (git) before 5ee51b19855c5dd72aca57b8014f3b70d7798733
affected

77b001acdcfeb892842caac49fb7f0d286b29c43 (git) before 21e9a838f505178e109ccb3bf19d7808eb0326f4
affected

Default status
affected

5.19
affected

Any version before 5.19
unaffected

6.1.16 (semver)
unaffected

6.2.3 (semver)
unaffected

6.3 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/3723c4dbcd14cc96771000ce0b0540801e6ba059

git.kernel.org/...c/5ee51b19855c5dd72aca57b8014f3b70d7798733

git.kernel.org/...c/21e9a838f505178e109ccb3bf19d7808eb0326f4

cve.org (CVE-2023-53284)

nvd.nist.gov (CVE-2023-53284)

Download JSON