GHSA-GHVQ-VPW4-HMQ7

Vulnerability from github – Published: 2025-12-24 12:30 – Updated: 2025-12-24 12:30
VLAI?
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/hdmi: Add missing check for alloc_ordered_workqueue

Add check for the return value of alloc_ordered_workqueue as it may return NULL pointer and cause NULL pointer dereference in hdmi_hdcp.c and hdmi_hpd.c.

Patchwork: https://patchwork.freedesktop.org/patch/517211/

Show details on source website

{
  "affected": [],
  "aliases": [
    "CVE-2023-54018"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2025-12-24T11:15:54Z",
    "severity": null
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/hdmi: Add missing check for alloc_ordered_workqueue\n\nAdd check for the return value of alloc_ordered_workqueue as it may return\nNULL pointer and cause NULL pointer dereference in `hdmi_hdcp.c` and\n`hdmi_hpd.c`.\n\nPatchwork: https://patchwork.freedesktop.org/patch/517211/",
  "id": "GHSA-ghvq-vpw4-hmq7",
  "modified": "2025-12-24T12:30:28Z",
  "published": "2025-12-24T12:30:28Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-54018"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/1bab31a0969ca4ac90907a5d3b44af104229eafd"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/392f7eb3946ab3780b931af723033e19f82c9134"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/9a01ecc312e764ec4527ad49105a3ca799f1860c"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/ae5ca116a0c0ba9fc4123b1f1ec3c4f4d0d01b3f"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/afe4cb96153a0d8003e4e4ebd91b5c543e10df84"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/b479485b24da1d572a0ce875537af31b02d2f915"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/e55f93d674314f2fb69eba0dc24acfdf72805611"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/fc34608fa275fe6b3b17e171b63b8ca3aa1cbf09"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…