CVE-2023-53310
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
16/09/2025
Última modificación:
17/09/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
power: supply: axp288_fuel_gauge: Fix external_power_changed race<br />
<br />
fuel_gauge_external_power_changed() dereferences info->bat,<br />
which gets sets in axp288_fuel_gauge_probe() like this:<br />
<br />
info->bat = devm_power_supply_register(dev, &fuel_gauge_desc, &psy_cfg);<br />
<br />
As soon as devm_power_supply_register() has called device_add()<br />
the external_power_changed callback can get called. So there is a window<br />
where fuel_gauge_external_power_changed() may get called while<br />
info->bat has not been set yet leading to a NULL pointer dereference.<br />
<br />
Fixing this is easy. The external_power_changed callback gets passed<br />
the power_supply which will eventually get stored in info->bat,<br />
so fuel_gauge_external_power_changed() can simply directly use<br />
the passed in psy argument which is always valid.