Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/ttm: fix bulk_move corruption when adding a entry When the resource is the first in the bulk_move range, adding it again (thus moving it to the tail) will corrupt the list since the first pointer is not moved. This eventually lead to null pointer deref in ttm_lru_bulk_move_del()

PUBLISHED Reserved 2025-09-17 | Published 2025-09-18 | Updated 2025-09-18 | Assigner Linux

Product status

Default status
unaffected

fee2ede155423b0f7a559050a39750b98fe9db69 (git) before 70a3015683b007a0db4a1e858791b69afd45fc83
affected

fee2ede155423b0f7a559050a39750b98fe9db69 (git) before e7cf50e41bdc2d574056ebbfeaafc5f0e2562d5b
affected

fee2ede155423b0f7a559050a39750b98fe9db69 (git) before 4481913607e58196c48a4fef5e6f45350684ec3c
affected

Default status
affected

5.19
affected

Any version before 5.19
unaffected

6.1.42 (semver)
unaffected

6.4.7 (semver)
unaffected

6.5 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/70a3015683b007a0db4a1e858791b69afd45fc83

git.kernel.org/...c/e7cf50e41bdc2d574056ebbfeaafc5f0e2562d5b

git.kernel.org/...c/4481913607e58196c48a4fef5e6f45350684ec3c

cve.org (CVE-2023-53444)

nvd.nist.gov (CVE-2023-53444)

Download JSON