CVE-2023-54044
Null Pointer Dereference in Linux Kernel SPMI Driver Removal
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's SPMI driver removal process. When removing a SPMI driver that does not have a remove callback defined, the kernel may attempt to call a NULL pointer, causing a crash. The issue arises because the code did not check if the remove callback was present before calling it. This has been fixed by adding a check for the remove callback before calling it during driver removal.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that your Linux kernel is updated to a version where the check for the remove callback in the SPMI driver removal process has been added. This prevents crashes due to NULL pointer dereference when removing SPMI drivers without a remove callback. Applying the latest kernel patches or updates that include this fix is the recommended immediate step.
How can this vulnerability impact me? :
If you remove a SPMI driver without a defined remove callback, the system could crash due to a NULL pointer dereference. This could lead to system instability or downtime, especially if the affected driver is critical to your hardware's operation.