CVE-2023-53612
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's coretemp platform driver, which uses an unconventional method for handling platform devices. The driver relies on dynamically creating and destroying platform devices assuming synchronous binding and setting of driver data, which can lead to a NULL pointer dereference if drivers_autoprobe is disabled. Additionally, the approach taken within a CPU hotplug notifier can cause deadlocks during suspend and lock dependency issues for other drivers or subsystems registering CPU hotplug notifiers. The fix simplifies the handling by tying platform devices to the module's lifetime and managing hwmon interfaces directly from hotplug notifiers, removing the problematic behavior.
How can this vulnerability impact me? :
This vulnerability can cause system instability such as NULL pointer dereferences leading to potential crashes or kernel panics, deadlocks during suspend operations, and lock dependency issues affecting other drivers or subsystems. These impacts can degrade system reliability and availability.