Home

Description

In the Linux kernel, the following vulnerability has been resolved: regulator: da9063: better fix null deref with partial DT Two versions of the original patch were sent but V1 was merged instead of V2 due to a mistake. So update to V2. The advantage of V2 is that it completely avoids dereferencing the pointer, even just to take the address, which may fix problems with some compilers. Both versions work on my gcc 9.4 but use the safer one.

PUBLISHED Reserved 2025-09-17 | Published 2025-09-17 | Updated 2025-09-17 | Assigner Linux

Product status

Default status
unaffected

04a025b17d83d07924e5e32508c72536ab8f42d9 (git) before aa402a3b553bd4829f4504058d53b0351c66c9d4
affected

98e2dd5f7a8be5cb2501a897e96910393a49f0ff (git) before 30c694fd4a99fbbc4115d180156ca01b60953371
affected

Default status
unaffected

6.4.7 (semver) before 6.4.12
affected

References

git.kernel.org/...c/aa402a3b553bd4829f4504058d53b0351c66c9d4

git.kernel.org/...c/30c694fd4a99fbbc4115d180156ca01b60953371

cve.org (CVE-2023-53364)

nvd.nist.gov (CVE-2023-53364)

Download JSON