{"id":"CVE-2023-52875","summary":"clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data\n\nAdd the check for the return value of mtk_alloc_clk_data() in order to\navoid NULL pointer dereference.","modified":"2026-04-11T12:46:37.840730Z","published":"2024-05-21T15:32:08.604Z","related":["SUSE-SU-2024:1979-1","SUSE-SU-2024:1983-1","SUSE-SU-2024:2008-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2184-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2571-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52875.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/001e5def774fa1a8f2b29567c0b0cd3e3a859a96"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0d6e24b422a2166a9297a8286ff2e6ab9a5e8cd3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1953e62366da5460dc712e045f94fb0d8918999d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1bf9c204aef4cc55ce46a7ff2d4dc7e5f86551a7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2a18dd653284550900b02107c3c7b3ac5e0eb802"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6fccee2af400edaed9cf349d506c5971d4762739"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d1175cf4bd2b4c5f7c43f677ea1ce9ad2c18d055"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d1461f0c9ca0827c03730fe9652ebbf6316a2a95"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e61934720af4a58ffd43a63ffdd6f3a0bd7d7b47"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52875.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52875"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e9862118272aa528e35e54ef9f1e35c217870fd7"},{"fixed":"6fccee2af400edaed9cf349d506c5971d4762739"},{"fixed":"1953e62366da5460dc712e045f94fb0d8918999d"},{"fixed":"d1461f0c9ca0827c03730fe9652ebbf6316a2a95"},{"fixed":"001e5def774fa1a8f2b29567c0b0cd3e3a859a96"},{"fixed":"d1175cf4bd2b4c5f7c43f677ea1ce9ad2c18d055"},{"fixed":"2a18dd653284550900b02107c3c7b3ac5e0eb802"},{"fixed":"e61934720af4a58ffd43a63ffdd6f3a0bd7d7b47"},{"fixed":"1bf9c204aef4cc55ce46a7ff2d4dc7e5f86551a7"},{"fixed":"0d6e24b422a2166a9297a8286ff2e6ab9a5e8cd3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52875.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.10.0"},{"fixed":"4.14.330"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.299"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.261"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.201"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.139"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.63"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.5.12"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.6.0"},{"fixed":"6.6.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52875.json"}}],"schema_version":"1.7.5"}