CVE-2023-52862

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52862
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52862.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52862
Downstream
Related
Published
2024-05-21T15:31:54Z
Modified
2025-10-14T08:13:49.150139Z
Severity
  • 4.1 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
drm/amd/display: Fix null pointer dereference in error message
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix null pointer dereference in error message

This patch fixes a null pointer dereference in the error message that is printed when the Display Core (DC) fails to initialize. The original message includes the DC version number, which is undefined if the DC is not initialized.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9788d087caffd8358d6e14349ee69d9385666719
Fixed
97ef07182ac46b069bb5e7d46cb903a764d67898
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9788d087caffd8358d6e14349ee69d9385666719
Fixed
8b72c5d4a5d25e76b16283397c40b8b3c0d70019
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9788d087caffd8358d6e14349ee69d9385666719
Fixed
0c3601a2fbfb265ce283651480e30c8e60459112

Affected versions

v6.*

v6.3
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.5.1
v6.5.10
v6.5.11
v6.5.2
v6.5.3
v6.5.4
v6.5.5
v6.5.6
v6.5.7
v6.5.8
v6.5.9
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1

Database specific

{
    "vanir_signatures": [
        {
            "target": {
                "function": "amdgpu_dm_init",
                "file": "drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c"
            },
            "deprecated": false,
            "digest": {
                "length": 8344.0,
                "function_hash": "98334589647872028713661868539091815687"
            },
            "id": "CVE-2023-52862-5fceac4c",
            "signature_type": "Function",
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@97ef07182ac46b069bb5e7d46cb903a764d67898"
        },
        {
            "target": {
                "function": "amdgpu_dm_init",
                "file": "drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c"
            },
            "deprecated": false,
            "digest": {
                "length": 8595.0,
                "function_hash": "15110069900394469721617312752166711457"
            },
            "id": "CVE-2023-52862-750c09fe",
            "signature_type": "Function",
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0c3601a2fbfb265ce283651480e30c8e60459112"
        },
        {
            "target": {
                "function": "amdgpu_dm_init",
                "file": "drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c"
            },
            "deprecated": false,
            "digest": {
                "length": 8431.0,
                "function_hash": "267935116686452155337277430693835038772"
            },
            "id": "CVE-2023-52862-826ce102",
            "signature_type": "Function",
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8b72c5d4a5d25e76b16283397c40b8b3c0d70019"
        },
        {
            "target": {
                "file": "drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c"
            },
            "deprecated": false,
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "185942918572770404949705180764214473693",
                    "203805084337197399809280392810121156062",
                    "200556311156545251212568406533873627307",
                    "77195951899233512199722477174735767797",
                    "38012899297865292887002260571800697705"
                ]
            },
            "id": "CVE-2023-52862-98c1895a",
            "signature_type": "Line",
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8b72c5d4a5d25e76b16283397c40b8b3c0d70019"
        },
        {
            "target": {
                "file": "drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c"
            },
            "deprecated": false,
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "185942918572770404949705180764214473693",
                    "203805084337197399809280392810121156062",
                    "200556311156545251212568406533873627307",
                    "77195951899233512199722477174735767797",
                    "38012899297865292887002260571800697705"
                ]
            },
            "id": "CVE-2023-52862-a49e96ed",
            "signature_type": "Line",
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@97ef07182ac46b069bb5e7d46cb903a764d67898"
        },
        {
            "target": {
                "file": "drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c"
            },
            "deprecated": false,
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "185942918572770404949705180764214473693",
                    "203805084337197399809280392810121156062",
                    "200556311156545251212568406533873627307",
                    "77195951899233512199722477174735767797",
                    "38012899297865292887002260571800697705"
                ]
            },
            "id": "CVE-2023-52862-b7fd3617",
            "signature_type": "Line",
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0c3601a2fbfb265ce283651480e30c8e60459112"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.5.0
Fixed
6.5.12
Type
ECOSYSTEM
Events
Introduced
6.6.0
Fixed
6.6.2