CVE-2023-54199

Source
https://cve.org/CVERecord?id=CVE-2023-54199
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54199.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-54199
Downstream
Related
Published
2025-12-30T12:09:04.886Z
Modified
2026-04-02T09:45:40.861655Z
Summary
drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup()
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/adreno: Fix null ptr access in adrenogpucleanup()

Fix the below kernel panic due to null pointer access: [ 18.504431] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000048 [ 18.513464] Mem abort info: [ 18.516346] ESR = 0x0000000096000005 [ 18.520204] EC = 0x25: DABT (current EL), IL = 32 bits [ 18.525706] SET = 0, FnV = 0 [ 18.528878] EA = 0, S1PTW = 0 [ 18.532117] FSC = 0x05: level 1 translation fault [ 18.537138] Data abort info: [ 18.540110] ISV = 0, ISS = 0x00000005 [ 18.544060] CM = 0, WnR = 0 [ 18.547109] user pgtable: 4k pages, 39-bit VAs, pgdp=0000000112826000 [ 18.553738] [0000000000000048] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000 [ 18.562690] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP Snip [ 18.696758] Call trace: [ 18.699278] adrenogpucleanup+0x30/0x88 [ 18.703396] a6xxdestroy+0xc0/0x130 [ 18.707066] a6xxgpuinit+0x308/0x424 [ 18.710921] adrenobind+0x178/0x288 [ 18.714590] componentbindall+0xe0/0x214 [ 18.718797] msmdrmbind+0x1d4/0x614 [ 18.722566] trytobringupaggregate_device+0x16c/0x1b8 [ 18.728105] __componentadd+0xa0/0x158 [ 18.732048] componentadd+0x20/0x2c [ 18.735719] adrenoprobe+0x40/0xc0 [ 18.739300] platformprobe+0xb4/0xd4 [ 18.743068] really_probe+0xfc/0x284 [ 18.746738] __driverprobedevice+0xc0/0xec [ 18.751129] driverprobedevice+0x48/0x110 [ 18.755421] __deviceattachdriver+0xa8/0xd0 [ 18.759900] bus_foreachdrv+0x90/0xdc [ 18.763843] _deviceattach+0xfc/0x174 [ 18.767786] deviceinitialprobe+0x20/0x2c [ 18.772090] busprobedevice+0x40/0xa0 [ 18.776032] deferredprobeworkfunc+0x94/0xd0 [ 18.780686] processonework+0x190/0x3d0 [ 18.784805] workerthread+0x280/0x3d4 [ 18.788659] kthread+0x104/0x1c0 [ 18.791981] retfromfork+0x10/0x20 [ 18.795654] Code: f9400408 aa0003f3 aa1f03f4 91142015 (f9402516) [ 18.801913] ---[ end trace 0000000000000000 ]--- [ 18.809039] Kernel panic - not syncing: Oops: Fatal exception

Patchwork: https://patchwork.freedesktop.org/patch/515605/

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54199.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
594726c93841c9e6182d3af540c6f317464bc23d
Fixed
65a8b6d129cfcf63a2b8a36a63d275479ba6a217
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
17e822f7591fb66162aca07685dc0b01468e5480
Fixed
b26bd7791f3cdf3c3318162b1d40c9d1910facca
Fixed
399d01375659c273fb6ad9ccfb6e92bc5b891e0d
Fixed
7af606b9eb11d6cdf767cabbddc326e20d0d4702
Fixed
5fef23c1c0edceb44d16e64e7818f27d48b5bc38
Fixed
dbeedbcb268d055d8895aceca427f897e12c2b50

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54199.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.9.0
Fixed
5.10.173
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.99
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.16
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54199.json"