In the Linux kernel, the following vulnerability has been resolved:
ACPI: processor: Check for null return of devmkzalloc() in fchmisc_setup()
devmkzalloc() may fail, clkdata->name might be NULL and will cause a NULL pointer dereference later.
[ rjw: Subject and changelog edits ]
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53483.json",
"cna_assigner": "Linux"
}[
{
"id": "CVE-2023-53483-3c4cabfe",
"signature_version": "v1",
"digest": {
"function_hash": "160906773746189457068076198259380958452",
"length": 901.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8a632ff6a2bea49993002b4c46092a2aea625840",
"signature_type": "Function",
"target": {
"file": "drivers/acpi/acpi_apd.c",
"function": "fch_misc_setup"
}
},
{
"id": "CVE-2023-53483-43c389d1",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"235095061563284511495863724945591543647",
"312476221219438763839363856730959245087",
"4668458445868989666942173113882833616",
"167114014454353683635206344218812609375"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@79ca94bc3e8cc3befa883c7d30b30a27ef0ea386",
"signature_type": "Line",
"target": {
"file": "drivers/acpi/acpi_apd.c"
}
},
{
"id": "CVE-2023-53483-61a9ff07",
"signature_version": "v1",
"digest": {
"function_hash": "160906773746189457068076198259380958452",
"length": 901.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@79ca94bc3e8cc3befa883c7d30b30a27ef0ea386",
"signature_type": "Function",
"target": {
"file": "drivers/acpi/acpi_apd.c",
"function": "fch_misc_setup"
}
},
{
"id": "CVE-2023-53483-70364b3f",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"235095061563284511495863724945591543647",
"312476221219438763839363856730959245087",
"4668458445868989666942173113882833616",
"167114014454353683635206344218812609375"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8a632ff6a2bea49993002b4c46092a2aea625840",
"signature_type": "Line",
"target": {
"file": "drivers/acpi/acpi_apd.c"
}
},
{
"id": "CVE-2023-53483-ccea4e5e",
"signature_version": "v1",
"digest": {
"function_hash": "160906773746189457068076198259380958452",
"length": 901.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4dea41775d951ff1f7b472a346a8ca3ae7e74455",
"signature_type": "Function",
"target": {
"file": "drivers/acpi/acpi_apd.c",
"function": "fch_misc_setup"
}
},
{
"id": "CVE-2023-53483-e55575d0",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"235095061563284511495863724945591543647",
"312476221219438763839363856730959245087",
"4668458445868989666942173113882833616",
"167114014454353683635206344218812609375"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4dea41775d951ff1f7b472a346a8ca3ae7e74455",
"signature_type": "Line",
"target": {
"file": "drivers/acpi/acpi_apd.c"
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53483.json"