CVE-2023-53352

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53352
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53352.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53352
Published
2025-09-17T15:15:39Z
Modified
2025-09-18T08:55:59.141365Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/ttm: check null pointer before accessing when swapping

Add a check to avoid null pointer dereference as below:

[ 90.002283] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 90.002292] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 90.002346] ? excgeneralprotection+0x159/0x240 [ 90.002352] ? asmexcgeneralprotection+0x26/0x30 [ 90.002357] ? ttmboevictswapoutallowable+0x322/0x5e0 [ttm] [ 90.002365] ? ttmboevictswapoutallowable+0x42e/0x5e0 [ttm] [ 90.002373] ttmboswapout+0x134/0x7f0 [ttm] [ 90.002383] ? _pfxttmboswapout+0x10/0x10 [ttm] [ 90.002391] ? lockacquire+0x44d/0x4f0 [ 90.002398] ? ttmdeviceswapout+0xa5/0x260 [ttm] [ 90.002412] ? lockacquired+0x355/0xa00 [ 90.002416] ? dorawspintrylock+0xb6/0x190 [ 90.002421] ? _pfxlockacquired+0x10/0x10 [ 90.002426] ? ttmglobalswapout+0x25/0x210 [ttm] [ 90.002442] ttmdeviceswapout+0x198/0x260 [ttm] [ 90.002456] ? _pfxttmdeviceswapout+0x10/0x10 [ttm] [ 90.002472] ttmglobalswapout+0x75/0x210 [ttm] [ 90.002486] ttmttpopulate+0x187/0x3f0 [ttm] [ 90.002501] ttmbohandlemovemem+0x437/0x590 [ttm] [ 90.002517] ttmbovalidate+0x275/0x430 [ttm] [ 90.002530] ? _pfxttmbovalidate+0x10/0x10 [ttm] [ 90.002544] ? kasansavestack+0x33/0x60 [ 90.002550] ? kasansettrack+0x25/0x30 [ 90.002554] ? _kasankmalloc+0x8f/0xa0 [ 90.002558] ? amdgpugttmgrnew+0x81/0x420 [amdgpu] [ 90.003023] ? ttmresourcealloc+0xf6/0x220 [ttm] [ 90.003038] amdgpubopinrestricted+0x2dd/0x8b0 [amdgpu] [ 90.003210] ? _x64sysioctl+0x131/0x1a0 [ 90.003210] ? dosyscall64+0x60/0x90

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.191-1

Affected versions

5.*

5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1
5.10.127-1
5.10.127-2~bpo10+1
5.10.127-2
5.10.136-1
5.10.140-1
5.10.148-1
5.10.149-1
5.10.149-2
5.10.158-1
5.10.158-2
5.10.162-1
5.10.178-1
5.10.178-2
5.10.178-3
5.10.179-1
5.10.179-2
5.10.179-3
5.10.179-4
5.10.179-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.52-1

Affected versions

6.*

6.1.27-1
6.1.37-1
6.1.38-1
6.1.38-2~bpo11+1
6.1.38-2
6.1.38-3
6.1.38-4~bpo11+1
6.1.38-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.4.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.4.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}