Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup() devm_kzalloc() may fail, clk_data->name might be NULL and will cause a NULL pointer dereference later. [ rjw: Subject and changelog edits ]
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.17, < 6.1.30 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/4dea41775d951ff1f7b472a346a8ca3ae7e74455Patch
- https://git.kernel.org/stable/c/79ca94bc3e8cc3befa883c7d30b30a27ef0ea386Patch
- https://git.kernel.org/stable/c/8a632ff6a2bea49993002b4c46092a2aea625840Patch
FAQ
What is CVE-2023-53483?
CVE-2023-53483 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup() devm_kzalloc() may fail, clk_data->name might be NULL...
How severe is CVE-2023-53483?
CVE-2023-53483 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-53483?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.