CVE-2023-54217
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
30/12/2025
Última modificación:
30/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Revert "drm/msm: Add missing check and destroy for alloc_ordered_workqueue"<br />
<br />
This reverts commit 643b7d0869cc7f1f7a5ac7ca6bd25d88f54e31d0.<br />
<br />
A recent patch that tried to fix up the msm_drm_init() paths with<br />
respect to the workqueue but only ended up making things worse:<br />
<br />
First, the newly added calls to msm_drm_uninit() on early errors would<br />
trigger NULL-pointer dereferences, for example, as the kms pointer would<br />
not have been initialised. (Note that these paths were also modified by<br />
a second broken error handling patch which in effect cancelled out this<br />
part when merged.)<br />
<br />
Second, the newly added allocation sanity check would still leak the<br />
previously allocated drm device.<br />
<br />
Instead of trying to salvage what was badly broken (and clearly not<br />
tested), let&#39;s revert the bad commit so that clean and backportable<br />
fixes can be added in its place.<br />
<br />
Patchwork: https://patchwork.freedesktop.org/patch/525107/



