In the Linux kernel, the following vulnerability has been resolved:
OPP: Fix potential null ptr dereference in devpmoppgetrequired_pstate()
"opp" pointer is dereferenced before the ISERRORNULL() check. Fix it by removing the dereference to cache opptable and dereference it directly where opp_table is used.
This fixes the following smatch warning:
drivers/opp/core.c:232 devpmoppgetrequiredpstate() warn: variable dereferenced before ISERR check 'opp' (see line 230)
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53664.json"
}[
{
"digest": {
"length": 503.0,
"function_hash": "290903492526155382094232460387643892833"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7ddd8deb1c3c0363a7e14fafb5df26e2089a69a5",
"deprecated": false,
"id": "CVE-2023-53664-05a79cbb",
"signature_type": "Function",
"target": {
"function": "dev_pm_opp_get_required_pstate",
"file": "drivers/opp/core.c"
},
"signature_version": "v1"
},
{
"digest": {
"length": 503.0,
"function_hash": "290903492526155382094232460387643892833"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@25130b27e0352acb83e91c467853eb9afad3b644",
"deprecated": false,
"id": "CVE-2023-53664-0d2e8478",
"signature_type": "Function",
"target": {
"function": "dev_pm_opp_get_required_pstate",
"file": "drivers/opp/core.c"
},
"signature_version": "v1"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"138577540345552981252282238489055716745",
"108949415491777322691590789445968872683",
"298814929921369947809130590253301879632",
"22466415589024986710149120309185738484",
"41346484183047226641757054568288357922",
"42557193514961473014236808820509712536",
"18590454390475049043539441130386561234",
"277459778465894387547462332697080398355",
"279720518603179335821915125105985956940",
"32665721680638152406389847156928298134",
"312021631776118539014988896626621580364",
"210814553985887542906347657188439486545"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7ddd8deb1c3c0363a7e14fafb5df26e2089a69a5",
"deprecated": false,
"id": "CVE-2023-53664-16d999c1",
"signature_type": "Line",
"target": {
"file": "drivers/opp/core.c"
},
"signature_version": "v1"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"138577540345552981252282238489055716745",
"108949415491777322691590789445968872683",
"298814929921369947809130590253301879632",
"22466415589024986710149120309185738484",
"41346484183047226641757054568288357922",
"42557193514961473014236808820509712536",
"18590454390475049043539441130386561234",
"277459778465894387547462332697080398355",
"279720518603179335821915125105985956940",
"32665721680638152406389847156928298134",
"312021631776118539014988896626621580364",
"210814553985887542906347657188439486545"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@25130b27e0352acb83e91c467853eb9afad3b644",
"deprecated": false,
"id": "CVE-2023-53664-3efcc66a",
"signature_type": "Line",
"target": {
"file": "drivers/opp/core.c"
},
"signature_version": "v1"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53664.json"