In the Linux kernel, the following vulnerability has been resolved:
regulator: da9063: better fix null deref with partial DT
Two versions of the original patch were sent but V1 was merged instead of V2 due to a mistake.
So update to V2.
The advantage of V2 is that it completely avoids dereferencing the pointer, even just to take the address, which may fix problems with some compilers. Both versions work on my gcc 9.4 but use the safer one.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53364.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53364.json"
[
{
"id": "CVE-2023-53364-0ded1e11",
"target": {
"file": "drivers/regulator/da9063-regulator.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aa402a3b553bd4829f4504058d53b0351c66c9d4",
"digest": {
"threshold": 0.9,
"line_hashes": [
"43750123406077658808249051155089422330",
"26989539511239981823308844315987724953",
"42712540063542707381499704697127296954",
"262708069597131726005750863261773189545",
"100322167125994792151818631162506828708",
"236083297953205801193532117699808606501",
"154810530704609976098764798141701466037",
"125294734876142801425705443022492717909",
"41982814074118747213527408197248051412",
"302342922627372726245274883299651724080",
"61305055522259332543775755253682085455"
]
},
"signature_type": "Line"
},
{
"id": "CVE-2023-53364-2eaf9f6b",
"target": {
"file": "drivers/regulator/da9063-regulator.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@30c694fd4a99fbbc4115d180156ca01b60953371",
"digest": {
"threshold": 0.9,
"line_hashes": [
"43750123406077658808249051155089422330",
"26989539511239981823308844315987724953",
"42712540063542707381499704697127296954",
"262708069597131726005750863261773189545",
"100322167125994792151818631162506828708",
"236083297953205801193532117699808606501",
"154810530704609976098764798141701466037",
"125294734876142801425705443022492717909",
"41982814074118747213527408197248051412",
"302342922627372726245274883299651724080",
"61305055522259332543775755253682085455"
]
},
"signature_type": "Line"
},
{
"id": "CVE-2023-53364-6a20fafb",
"target": {
"function": "da9063_regulator_probe",
"file": "drivers/regulator/da9063-regulator.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@30c694fd4a99fbbc4115d180156ca01b60953371",
"digest": {
"function_hash": "144876529269486792006549909011361617405",
"length": 3566.0
},
"signature_type": "Function"
},
{
"id": "CVE-2023-53364-8594b5f1",
"target": {
"function": "da9063_check_xvp_constraints",
"file": "drivers/regulator/da9063-regulator.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aa402a3b553bd4829f4504058d53b0351c66c9d4",
"digest": {
"function_hash": "284402972487915270554140050108154232553",
"length": 990.0
},
"signature_type": "Function"
},
{
"id": "CVE-2023-53364-95d21dcd",
"target": {
"function": "da9063_regulator_probe",
"file": "drivers/regulator/da9063-regulator.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aa402a3b553bd4829f4504058d53b0351c66c9d4",
"digest": {
"function_hash": "144876529269486792006549909011361617405",
"length": 3566.0
},
"signature_type": "Function"
},
{
"id": "CVE-2023-53364-987d8442",
"target": {
"function": "da9063_check_xvp_constraints",
"file": "drivers/regulator/da9063-regulator.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@30c694fd4a99fbbc4115d180156ca01b60953371",
"digest": {
"function_hash": "284402972487915270554140050108154232553",
"length": 990.0
},
"signature_type": "Function"
}
]