-
CVE-2023-54122
- EPSS 0.04%
- Veröffentlicht 24.12.2025 13:06:41
- Zuletzt bearbeitet 29.12.2025 15:58:34
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add check for cstate As kzalloc may fail and return NULL pointer, it should be better to check cstate in order to avoid the NULL pointer dereference in __drm_atomic_helper_crtc_reset. Patchwork: https://patchwork.freedesktop.org/patch/514163/
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
a6afb8293ec0932f4ed0b7aecfc0ccc00f44dc2b
Version
1cff7440a86e04a613665803b42034c467f035fa
Status
affected
Version <
31f2f8de0ea7387cde18a24f94ba5e0b886b9842
Version
1cff7440a86e04a613665803b42034c467f035fa
Status
affected
Version <
d4ba50614cb3f0686bbdb505af685d78e75861dc
Version
1cff7440a86e04a613665803b42034c467f035fa
Status
affected
Version <
42442d42c57b9fbc35cb5ef72c7e5347c5f7d082
Version
1cff7440a86e04a613665803b42034c467f035fa
Status
affected
Version <
a52e5a002d18bffabff66f6f59a74f8e9aac5afe
Version
1cff7440a86e04a613665803b42034c467f035fa
Status
affected
Version <
c96988b7d99327bb08bd9efd29a203b22cd88ace
Version
1cff7440a86e04a613665803b42034c467f035fa
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.3
Status
affected
Version <
5.3
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.235
Status
unaffected
Version <=
5.10.*
Version
5.10.173
Status
unaffected
Version <=
5.15.*
Version
5.15.99
Status
unaffected
Version <=
6.1.*
Version
6.1.16
Status
unaffected
Version <=
6.2.*
Version
6.2.3
Status
unaffected
Version <=
*
Version
6.3
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.1 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|