In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dpu: check for null return of devm_kzalloc() in dpu_writeback_init()
Because of the possilble failure of devm_kzalloc(), dpu_wb_conn might
be NULL and will cause null pointer dereference later.
Therefore, it might be better to check it and directly return -ENOMEM.
Patchwork: https://patchwork.freedesktop.org/patch/512277/
[DB: fixed typo in commit message]
References
Configurations
Configuration 1 (hide)
|
History
02 Dec 2025, 21:24
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux linux Kernel
Linux |
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | CWE-476 | |
| References | () https://git.kernel.org/stable/c/21e9a838f505178e109ccb3bf19d7808eb0326f4 - Patch | |
| References | () https://git.kernel.org/stable/c/3723c4dbcd14cc96771000ce0b0540801e6ba059 - Patch | |
| References | () https://git.kernel.org/stable/c/5ee51b19855c5dd72aca57b8014f3b70d7798733 - Patch |
Information
Published : 2025-09-16 08:15
Updated : 2025-12-02 21:24
NVD link : CVE-2023-53284
Mitre link : CVE-2023-53284
CVE.ORG link : CVE-2023-53284
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
