In the Linux kernel, the following vulnerability has been resolved:
OPP: Fix potential null ptr dereference in dev_pm_opp_get_required_pstate()
"opp" pointer is dereferenced before the IS_ERR_OR_NULL() check. Fix it by
removing the dereference to cache opp_table and dereference it directly
where opp_table is used.
This fixes the following smatch warning:
drivers/opp/core.c:232 dev_pm_opp_get_required_pstate() warn: variable
dereferenced before IS_ERR check 'opp' (see line 230)
Metrics
Affected Vendors & Products
References
History
Tue, 07 Oct 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: OPP: Fix potential null ptr dereference in dev_pm_opp_get_required_pstate() "opp" pointer is dereferenced before the IS_ERR_OR_NULL() check. Fix it by removing the dereference to cache opp_table and dereference it directly where opp_table is used. This fixes the following smatch warning: drivers/opp/core.c:232 dev_pm_opp_get_required_pstate() warn: variable dereferenced before IS_ERR check 'opp' (see line 230) | |
Title | OPP: Fix potential null ptr dereference in dev_pm_opp_get_required_pstate() | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-10-07T15:21:23.127Z
Reserved: 2025-10-07T15:16:59.662Z
Link: CVE-2023-53664

No data.

Status : Received
Published: 2025-10-07T16:15:50.163
Modified: 2025-10-07T16:15:50.163
Link: CVE-2023-53664

No data.

No data.