CVE-2023-54298Release of Invalid Pointer or Reference in Linux

Severity
3.3LOW
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: thermal: intel: quark_dts: fix error pointer dereference If alloc_soc_dts() fails, then we can just return. Trying to free "soc_dts" will lead to an Oops.

Affected Packages4 packages

Linuxlinux/linux_kernel4.2.04.14.308+6
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux8c1876939663191b5044807230fa295f354622150b366c6a42e2e2bc67af8d1130b68f3bfa31c80e+8
debiandebian/linux< linux 6.1.20-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-54298: In the Linux kernel, the following vulnerability has been resolved: thermal: intel: quark_dts: fix error pointer dereference If alloc_soc_dts() fails,2025-12-30
OSV
thermal: intel: quark_dts: fix error pointer dereference2025-12-30
GHSA
GHSA-3fg3-j45r-7qh2: In the Linux kernel, the following vulnerability has been resolved: thermal: intel: quark_dts: fix error pointer dereference If alloc_soc_dts() fail2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: thermal: intel: quark_dts: fix error pointer dereference2025-12-30
Debian
CVE-2023-54298: linux - In the Linux kernel, the following vulnerability has been resolved: thermal: in...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54298 Impact, Exploitability, and Mitigation Steps | Wiz