In the Linux kernel, the following vulnerability has been resolved:
power: supply: axp288_fuel_gauge: Fix external_power_changed race
fuel_gauge_external_power_changed() dereferences info->bat,
which gets sets in axp288_fuel_gauge_probe() like this:
info->bat = devm_power_supply_register(dev, &fuel_gauge_desc, &psy_cfg);
As soon as devm_power_supply_register() has called device_add()
the external_power_changed callback can get called. So there is a window
where fuel_gauge_external_power_changed() may get called while
info->bat has not been set yet leading to a NULL pointer dereference.
Fixing this is easy. The external_power_changed callback gets passed
the power_supply which will eventually get stored in info->bat,
so fuel_gauge_external_power_changed() can simply directly use
the passed in psy argument which is always valid.
References
Configurations
Configuration 1 (hide)
|
History
01 Dec 2025, 21:46
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.4:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| First Time |
Linux
Linux linux Kernel |
|
| CWE | CWE-362 | |
| References | () https://git.kernel.org/stable/c/0456b912121e45b3ef54abe3135e5dcb541f956c - Patch | |
| References | () https://git.kernel.org/stable/c/a636c6ba9ce898207f283271cb28511206ab739b - Patch | |
| References | () https://git.kernel.org/stable/c/f8319774d6f1567d6e7d03653174ab0c82c5c66d - Patch |
16 Sep 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-16 17:15
Updated : 2025-12-01 21:46
NVD link : CVE-2023-53310
Mitre link : CVE-2023-53310
CVE.ORG link : CVE-2023-53310
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
