Home

Description

In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup() devm_kzalloc() may fail, clk_data->name might be NULL and will cause a NULL pointer dereference later. [ rjw: Subject and changelog edits ]

PUBLISHED Reserved 2025-10-01 | Published 2025-10-01 | Updated 2025-10-01 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 79ca94bc3e8cc3befa883c7d30b30a27ef0ea386
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 8a632ff6a2bea49993002b4c46092a2aea625840
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 4dea41775d951ff1f7b472a346a8ca3ae7e74455
affected

Default status
affected

6.1.30 (semver)
unaffected

6.3.4 (semver)
unaffected

6.4 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/79ca94bc3e8cc3befa883c7d30b30a27ef0ea386

git.kernel.org/...c/8a632ff6a2bea49993002b4c46092a2aea625840

git.kernel.org/...c/4dea41775d951ff1f7b472a346a8ca3ae7e74455

cve.org (CVE-2023-53483)

nvd.nist.gov (CVE-2023-53483)

Download JSON