CVE-2023-53664NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7

Description

In the Linux kernel, the following vulnerability has been resolved: OPP: Fix potential null ptr dereference in dev_pm_opp_get_required_pstate() "opp" pointer is dereferenced before the IS_ERR_OR_NULL() check. Fix it by removing the dereference to cache opp_table and dereference it directly where opp_table is used. This fixes the following smatch warning: drivers/opp/core.c:232 dev_pm_opp_get_required_pstate() warn: variable dereferenced before IS_ERR check 'opp' (see line 230)

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.56.5.3
Debianlinux/linux_kernel< 6.5.3-1+1
CVEListV5linux/linux84cb7ff35fcf7c0b552f553a3f2db9c3e92fc70725130b27e0352acb83e91c467853eb9afad3b644+2
debiandebian/linux< linux 6.5.3-1 (forky)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-p5vh-94g4-gf74: In the Linux kernel, the following vulnerability has been resolved: OPP: Fix potential null ptr dereference in dev_pm_opp_get_required_pstate() "opp2025-10-07
OSV
CVE-2023-53664: In the Linux kernel, the following vulnerability has been resolved: OPP: Fix potential null ptr dereference in dev_pm_opp_get_required_pstate() "opp"2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: OPP: Fix potential null ptr dereference in dev_pm_opp_get_required_pstate()2025-10-07
Debian
CVE-2023-53664: linux - In the Linux kernel, the following vulnerability has been resolved: OPP: Fix po...2023