CVE-2023-53551
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
04/10/2025
Last modified:
21/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: gadget: u_serial: Add null pointer check in gserial_resume<br />
<br />
Consider a case where gserial_disconnect has already cleared<br />
gser->ioport. And if a wakeup interrupt triggers afterwards,<br />
gserial_resume gets called, which will lead to accessing of<br />
gser->ioport and thus causing null pointer dereference.Add<br />
a null pointer check to prevent this.<br />
<br />
Added a static spinlock to prevent gser->ioport from becoming<br />
null after the newly added check.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.8 (including) | 5.10.171 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.97 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.2.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3b24c980dc07be4550a9d1450ed7057f882530e5
- https://git.kernel.org/stable/c/44e004f757a7ae13dfebaadbcfdb1a6f98c10377
- https://git.kernel.org/stable/c/5ec63fdbca604568890c577753c6f66c5b3ef0b5
- https://git.kernel.org/stable/c/c5360eec648bd506afa304ae4a71f82e13d41897
- https://git.kernel.org/stable/c/ec357cd3e8af614855d286dd378725cdc7264df6



