-
CVE-2023-53364
- EPSS 0.02%
- Published 17.09.2025 14:56:53
- Last modified 18.09.2025 13:43:34
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: regulator: da9063: better fix null deref with partial DT Two versions of the original patch were sent but V1 was merged instead of V2 due to a mistake. So update to V2. The advantage of V2 is that it completely avoids dereferencing the pointer, even just to take the address, which may fix problems with some compilers. Both versions work on my gcc 9.4 but use the safer one.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
aa402a3b553bd4829f4504058d53b0351c66c9d4
Version
04a025b17d83d07924e5e32508c72536ab8f42d9
Status
affected
Version <
30c694fd4a99fbbc4115d180156ca01b60953371
Version
98e2dd5f7a8be5cb2501a897e96910393a49f0ff
Status
affected
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
6.4.12
Version
6.4.7
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.05 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|