Home

Description

In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup() devm_kzalloc() may fail, clk_data->name might be NULL and will cause a NULL pointer dereference later. [ rjw: Subject and changelog edits ]

PUBLISHED Reserved 2025-10-01 | Published 2025-10-01 | Updated 2025-10-01 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 79ca94bc3e8cc3befa883c7d30b30a27ef0ea386
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 8a632ff6a2bea49993002b4c46092a2aea625840
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 4dea41775d951ff1f7b472a346a8ca3ae7e74455
affected

Default status
affected

6.1.30
unaffected

6.3.4
unaffected

6.4
unaffected

References

git.kernel.org/...c/79ca94bc3e8cc3befa883c7d30b30a27ef0ea386

git.kernel.org/...c/8a632ff6a2bea49993002b4c46092a2aea625840

git.kernel.org/...c/4dea41775d951ff1f7b472a346a8ca3ae7e74455

cve.org (CVE-2023-53483)

nvd.nist.gov (CVE-2023-53483)

Download JSON