CVE-2023-53166
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-11-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.4 |
| linux | linux_kernel | 6.4 |
| linux | linux_kernel | 6.4 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-362 | The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's power supply driver for the bq25890 charger. Specifically, the function bq25890_charger_external_power_changed() dereferences a pointer (bq->charger) that may not have been set yet during initialization, leading to a NULL pointer dereference and a kernel crash. This happens because the external_power_changed callback can be called before the charger pointer is initialized, causing the system to attempt to access invalid memory.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a NULL pointer dereference during system boot or power supply changes. This can lead to system instability, unexpected reboots, or failure to properly detect or manage power supply changes, potentially affecting device reliability and availability.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by modifying the external_power_changed callback in the Linux kernel driver for the bq25890 power supply. The fix involves using the passed-in psy argument directly in bq25890_charger_external_power_changed() to avoid a NULL pointer dereference. Immediate mitigation would involve updating the Linux kernel to a version that includes this fix.