CVE-2023-53483NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup() devm_kzalloc() may fail, clk_data->name might be NULL and will cause a NULL pointer dereference later. [ rjw: Subject and changelog edits ]

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.176.1.30+1
Debianlinux/linux_kernel< 6.1.37-1+2
CVEListV5linux/linux7fdb98e8a768b3ccc05494d3ea4436047f512b9d79ca94bc3e8cc3befa883c7d30b30a27ef0ea386+3
debiandebian/linux< linux 6.1.37-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-64fr-fj38-r253: In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup() dev2025-10-01
OSV
CVE-2023-53483: In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup() devm_2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup()2025-10-01
Debian
CVE-2023-53483: linux - In the Linux kernel, the following vulnerability has been resolved: ACPI: proce...2023
CVE-2023-53483 — NULL Pointer Dereference in Linux | cvebase