CVE-2023-53991

Source
https://cve.org/CVERecord?id=CVE-2023-53991
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53991.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53991
Downstream
Related
Published
2025-12-24T10:55:29.833Z
Modified
2026-03-20T12:33:23.331525Z
Summary
drm/msm/dpu: Disallow unallocated resources to be returned
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: Disallow unallocated resources to be returned

In the event that the topology requests resources that have not been created by the system (because they are typically not represented in dpumdsscfg ^1), the resource(s) in globalstate (in this case DSC blocks, until their allocation/assignment is being sanity-checked in "drm/msm/dpu: Reject topologies for which no DSC blocks are available") remain NULL but will still be returned out of dpurmgetassignedresources, where the caller expects to get an array containing numblks valid pointers (but instead gets these NULLs).

To prevent this from happening, where null-pointer dereferences typically result in a hard-to-debug platform lockup, numblks shouldn't increase past NULL blocks and will print an error and break instead. After all, maxblks represents the static size of the maximum number of blocks whereas the actual amount varies per platform.

^1: which can happen after a git rebase ended up moving additions to dpucfg to a different struct which has the same patch context.

Patchwork: https://patchwork.freedesktop.org/patch/517636/

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53991.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bb00a452d6f77391441ef7df48f7115dd459cd2f
Fixed
8dbd54d679e3ab37be43bc1ed9f463dbf83a2259
Fixed
bf661c5e3bc48973acb363c76e3db965d9ed26d0
Fixed
9e1e236acdc42b5c43ec8d7f03a39537e70cc309
Fixed
9fe3644c720ac87d150f0bba5a4ae86cae55afaf
Fixed
abc40122d9a69f56c04efb5a7485795f5ac799d1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53991.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.7.0
Fixed
5.10.173
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.99
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.16
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53991.json"