In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: u_serial: Add null pointer check in gserial_suspend
Consider a case where gserial_disconnect has already cleared
gser->ioport. And if gserial_suspend gets called afterwards,
it will lead to accessing of gser->ioport and thus causing
null pointer dereference.
Avoid this by adding a null pointer check. Added a static
spinlock to prevent gser->ioport from becoming null after
the newly added null pointer check.
References
Configurations
Configuration 1 (hide)
|
History
11 Dec 2025, 12:49
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/2788a3553f7497075653210b42e2aeb6ba95e28e - Patch | |
| References | () https://git.kernel.org/stable/c/2f6ecb89fe8feb2b60a53325b0eeb9866d88909a - Patch | |
| References | () https://git.kernel.org/stable/c/374447e3367767156405bedd230c5d391f4b7962 - Patch | |
| References | () https://git.kernel.org/stable/c/a8ea7ed644cbf6314b5b0136b5398754b549fb8f - Patch | |
| References | () https://git.kernel.org/stable/c/e60a827ac074ce6bd58305fe5a86afab5fce6a04 - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time |
Linux
Linux linux Kernel |
|
| CWE | CWE-476 |
17 Sep 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-17 15:15
Updated : 2025-12-11 12:49
NVD link : CVE-2023-53356
Mitre link : CVE-2023-53356
CVE.ORG link : CVE-2023-53356
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
