Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup() Fix the below kernel panic due to null pointer access: [ 18.504431] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000048 [ 18.513464] Mem abort info: [ 18.516346] ESR = 0x0000000096000005 [ 18.520204] EC = 0x25: DABT (current EL), IL = 32 bits [ 18.525706] SET = 0, FnV = 0 [ 18.528878] EA = 0, S1PTW = 0 [ 18.532117] FSC = 0x05: level 1 translation fault [ 18.537138] Data abort info: [ 18.540110] ISV = 0, ISS = 0x00000005 [ 18.544060] CM = 0, WnR = 0 [ 18.547109] user pgtable: 4k pages, 39-bit VAs, pgdp=0000000112826000 [ 18.553738] [0000000000000048] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000 [ 18.562690] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP **Snip** [ 18.696758] Call trace: [ 18.699278] adreno_gpu_cleanup+0x30/0x88 [ 18.703396] a6xx_destroy+0xc0/0x130 [ 18.707066] a6xx_gpu_init+0x308/0x424 [ 18.710921] adreno_bind+0x178/0x288 [ 18.714590] component_bind_all+0xe0/0x214 [ 18.718797] msm_drm_bind+0x1d4/0x614 [ 18.722566] try_to_bring_up_aggregate_device+0x16c/0x1b8 [ 18.728105] __component_add+0xa0/0x158 [ 18.732048] component_add+0x20/0x2c [ 18.735719] adreno_probe+0x40/0xc0 [ 18.739300] platform_probe+0xb4/0xd4 [ 18.743068] really_probe+0xfc/0x284 [ 18.746738] __driver_probe_device+0xc0/0xec [ 18.751129] driver_probe_device+0x48/0x110 [ 18.755421] __device_attach_driver+0xa8/0xd0 [ 18.759900] bus_for_each_drv+0x90/0xdc [ 18.763843] __device_attach+0xfc/0x174 [ 18.767786] device_initial_probe+0x20/0x2c [ 18.772090] bus_probe_device+0x40/0xa0 [ 18.776032] deferred_probe_work_func+0x94/0xd0 [ 18.780686] process_one_work+0x190/0x3d0 [ 18.784805] worker_thread+0x280/0x3d4 [ 18.788659] kthread+0x104/0x1c0 [ 18.791981] ret_from_fork+0x10/0x20 [ 18.795654] Code: f9400408 aa0003f3 aa1f03f4 91142015 (f9402516) [ 18.801913] ---[ end trace 0000000000000000 ]--- [ 18.809039] Kernel panic - not syncing: Oops: Fatal exception Patchwork: https://patchwork.freedesktop.org/patch/515605/

PUBLISHED Reserved 2025-12-30 | Published 2025-12-30 | Updated 2025-12-30 | Assigner Linux

Product status

Default status
unaffected

594726c93841c9e6182d3af540c6f317464bc23d (git) before 65a8b6d129cfcf63a2b8a36a63d275479ba6a217
affected

17e822f7591fb66162aca07685dc0b01468e5480 (git) before b26bd7791f3cdf3c3318162b1d40c9d1910facca
affected

17e822f7591fb66162aca07685dc0b01468e5480 (git) before 399d01375659c273fb6ad9ccfb6e92bc5b891e0d
affected

17e822f7591fb66162aca07685dc0b01468e5480 (git) before 7af606b9eb11d6cdf767cabbddc326e20d0d4702
affected

17e822f7591fb66162aca07685dc0b01468e5480 (git) before 5fef23c1c0edceb44d16e64e7818f27d48b5bc38
affected

17e822f7591fb66162aca07685dc0b01468e5480 (git) before dbeedbcb268d055d8895aceca427f897e12c2b50
affected

Default status
affected

5.9
affected

Any version before 5.9
unaffected

5.10.173 (semver)
unaffected

5.15.99 (semver)
unaffected

6.1.16 (semver)
unaffected

6.2.3 (semver)
unaffected

6.3 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/65a8b6d129cfcf63a2b8a36a63d275479ba6a217

git.kernel.org/...c/b26bd7791f3cdf3c3318162b1d40c9d1910facca

git.kernel.org/...c/399d01375659c273fb6ad9ccfb6e92bc5b891e0d

git.kernel.org/...c/7af606b9eb11d6cdf767cabbddc326e20d0d4702

git.kernel.org/...c/5fef23c1c0edceb44d16e64e7818f27d48b5bc38

git.kernel.org/...c/dbeedbcb268d055d8895aceca427f897e12c2b50

cve.org (CVE-2023-54199)

nvd.nist.gov (CVE-2023-54199)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.