-

CVE-2023-53284

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: check for null return of devm_kzalloc() in dpu_writeback_init()

Because of the possilble failure of devm_kzalloc(), dpu_wb_conn might
be NULL and will cause null pointer dereference later.

Therefore, it might be better to check it and directly return -ENOMEM.

Patchwork: https://patchwork.freedesktop.org/patch/512277/
[DB: fixed typo in commit message]

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 3723c4dbcd14cc96771000ce0b0540801e6ba059
Version 77b001acdcfeb892842caac49fb7f0d286b29c43
Status affected
Version < 5ee51b19855c5dd72aca57b8014f3b70d7798733
Version 77b001acdcfeb892842caac49fb7f0d286b29c43
Status affected
Version < 21e9a838f505178e109ccb3bf19d7808eb0326f4
Version 77b001acdcfeb892842caac49fb7f0d286b29c43
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.19
Status affected
Version < 5.19
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.16
Status unaffected
Version <= 6.2.*
Version 6.2.3
Status unaffected
Version <= *
Version 6.3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.043
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string