{"id":"CVE-2023-54199","summary":"drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup()\n\nFix the below kernel panic due to null pointer access:\n[   18.504431] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000048\n[   18.513464] Mem abort info:\n[   18.516346]   ESR = 0x0000000096000005\n[   18.520204]   EC = 0x25: DABT (current EL), IL = 32 bits\n[   18.525706]   SET = 0, FnV = 0\n[   18.528878]   EA = 0, S1PTW = 0\n[   18.532117]   FSC = 0x05: level 1 translation fault\n[   18.537138] Data abort info:\n[   18.540110]   ISV = 0, ISS = 0x00000005\n[   18.544060]   CM = 0, WnR = 0\n[   18.547109] user pgtable: 4k pages, 39-bit VAs, pgdp=0000000112826000\n[   18.553738] [0000000000000048] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n[   18.562690] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP\n**Snip**\n[   18.696758] Call trace:\n[   18.699278]  adreno_gpu_cleanup+0x30/0x88\n[   18.703396]  a6xx_destroy+0xc0/0x130\n[   18.707066]  a6xx_gpu_init+0x308/0x424\n[   18.710921]  adreno_bind+0x178/0x288\n[   18.714590]  component_bind_all+0xe0/0x214\n[   18.718797]  msm_drm_bind+0x1d4/0x614\n[   18.722566]  try_to_bring_up_aggregate_device+0x16c/0x1b8\n[   18.728105]  __component_add+0xa0/0x158\n[   18.732048]  component_add+0x20/0x2c\n[   18.735719]  adreno_probe+0x40/0xc0\n[   18.739300]  platform_probe+0xb4/0xd4\n[   18.743068]  really_probe+0xfc/0x284\n[   18.746738]  __driver_probe_device+0xc0/0xec\n[   18.751129]  driver_probe_device+0x48/0x110\n[   18.755421]  __device_attach_driver+0xa8/0xd0\n[   18.759900]  bus_for_each_drv+0x90/0xdc\n[   18.763843]  __device_attach+0xfc/0x174\n[   18.767786]  device_initial_probe+0x20/0x2c\n[   18.772090]  bus_probe_device+0x40/0xa0\n[   18.776032]  deferred_probe_work_func+0x94/0xd0\n[   18.780686]  process_one_work+0x190/0x3d0\n[   18.784805]  worker_thread+0x280/0x3d4\n[   18.788659]  kthread+0x104/0x1c0\n[   18.791981]  ret_from_fork+0x10/0x20\n[   18.795654] Code: f9400408 aa0003f3 aa1f03f4 91142015 (f9402516)\n[   18.801913] ---[ end trace 0000000000000000 ]---\n[   18.809039] Kernel panic - not syncing: Oops: Fatal exception\n\nPatchwork: https://patchwork.freedesktop.org/patch/515605/","modified":"2026-03-20T12:33:29.685738Z","published":"2025-12-30T12:09:04.886Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54199.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/399d01375659c273fb6ad9ccfb6e92bc5b891e0d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5fef23c1c0edceb44d16e64e7818f27d48b5bc38"},{"type":"WEB","url":"https://git.kernel.org/stable/c/65a8b6d129cfcf63a2b8a36a63d275479ba6a217"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7af606b9eb11d6cdf767cabbddc326e20d0d4702"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b26bd7791f3cdf3c3318162b1d40c9d1910facca"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dbeedbcb268d055d8895aceca427f897e12c2b50"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54199.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54199"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"594726c93841c9e6182d3af540c6f317464bc23d"},{"fixed":"65a8b6d129cfcf63a2b8a36a63d275479ba6a217"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"17e822f7591fb66162aca07685dc0b01468e5480"},{"fixed":"b26bd7791f3cdf3c3318162b1d40c9d1910facca"},{"fixed":"399d01375659c273fb6ad9ccfb6e92bc5b891e0d"},{"fixed":"7af606b9eb11d6cdf767cabbddc326e20d0d4702"},{"fixed":"5fef23c1c0edceb44d16e64e7818f27d48b5bc38"},{"fixed":"dbeedbcb268d055d8895aceca427f897e12c2b50"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54199.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.9.0"},{"fixed":"5.10.173"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.99"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.2.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54199.json"}}],"schema_version":"1.7.5"}