In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: u_serial: Add null pointer check in gserial_resume
Consider a case where gserial_disconnect has already cleared
gser->ioport. And if a wakeup interrupt triggers afterwards,
gserial_resume gets called, which will lead to accessing of
gser->ioport and thus causing null pointer dereference.Add
a null pointer check to prevent this.
Added a static spinlock to prevent gser->ioport from becoming
null after the newly added check.
References
Configurations
Configuration 1 (hide)
|
History
12 Feb 2026, 15:55
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/3b24c980dc07be4550a9d1450ed7057f882530e5 - Patch | |
| References | () https://git.kernel.org/stable/c/44e004f757a7ae13dfebaadbcfdb1a6f98c10377 - Patch | |
| References | () https://git.kernel.org/stable/c/5ec63fdbca604568890c577753c6f66c5b3ef0b5 - Patch | |
| References | () https://git.kernel.org/stable/c/c5360eec648bd506afa304ae4a71f82e13d41897 - Patch | |
| References | () https://git.kernel.org/stable/c/ec357cd3e8af614855d286dd378725cdc7264df6 - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CWE | CWE-476 |
04 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-04 16:15
Updated : 2026-02-12 15:55
NVD link : CVE-2023-53551
Mitre link : CVE-2023-53551
CVE.ORG link : CVE-2023-53551
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
