๐Ÿ” CVE Alert

CVE-2023-54026

UNKNOWN 0.0

opp: Fix use-after-free in lazy_opp_tables after probe deferral

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: opp: Fix use-after-free in lazy_opp_tables after probe deferral When dev_pm_opp_of_find_icc_paths() in _allocate_opp_table() returns -EPROBE_DEFER, the opp_table is freed again, to wait until all the interconnect paths are available. However, if the OPP table is using required-opps then it may already have been added to the global lazy_opp_tables list. The error path does not remove the opp_table from the list again. This can cause crashes later when the provider of the required-opps is added, since we will iterate over OPP tables that have already been freed. E.g.: Unable to handle kernel NULL pointer dereference when read CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.4.0-rc3 PC is at _of_add_opp_table_v2 (include/linux/of.h:949 drivers/opp/of.c:98 drivers/opp/of.c:344 drivers/opp/of.c:404 drivers/opp/of.c:1032) -> lazy_link_required_opp_table() Fix this by calling _of_clear_opp_table() to remove the opp_table from the list and clear other allocated resources. While at it, also add the missing mutex_destroy() calls in the error path.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 24, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
7eba0c7641b0009818e469dbfcdd87a0155ab9d4 < 39a0e723d3502f6dc4c603f57ebe8dc7bcc4a4bc 7eba0c7641b0009818e469dbfcdd87a0155ab9d4 < 76ab057de777723ec924654502d1a260ba7d7d54 7eba0c7641b0009818e469dbfcdd87a0155ab9d4 < c05e76d6b249e5254c31994eedd06dd3cc90dee0 7eba0c7641b0009818e469dbfcdd87a0155ab9d4 < b2a2ab039bd58f51355e33d7d3fc64605d7f870d
Linux / Linux
5.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/39a0e723d3502f6dc4c603f57ebe8dc7bcc4a4bc git.kernel.org: https://git.kernel.org/stable/c/76ab057de777723ec924654502d1a260ba7d7d54 git.kernel.org: https://git.kernel.org/stable/c/c05e76d6b249e5254c31994eedd06dd3cc90dee0 git.kernel.org: https://git.kernel.org/stable/c/b2a2ab039bd58f51355e33d7d3fc64605d7f870d