{"id":"CVE-2023-53425","summary":"media: platform: mediatek: vpu: fix NULL ptr dereference","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: platform: mediatek: vpu: fix NULL ptr dereference\n\nIf pdev is NULL, then it is still dereferenced.\n\nThis fixes this smatch warning:\n\ndrivers/media/platform/mediatek/vpu/mtk_vpu.c:570 vpu_load_firmware() warn: address of NULL pointer 'pdev'","modified":"2026-04-11T12:46:47.443426Z","published":"2025-09-18T16:04:07.335Z","related":["SUSE-SU-2025:03600-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53425.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/099e929e7477f37ca16738fc158d7101c0189ca1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1b3f25d3894a091abc247eadab266a2c9be64389"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2caeb722f0ea5d2d24af30bb1753a89d449b6aa0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3df55cd773e8603b623425cc97b05e542854ad27"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4d299e6e0ac3cf8ab4517dc29c9294bc4bf72398"},{"type":"WEB","url":"https://git.kernel.org/stable/c/776b34615a29551d69d82a0082e7319d5ea284bd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b7bd48f0be84e24d21aa3a8f59a8a9cb8633a1c4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c1c5826223ae05a48d21f6708c6f34ee9006238c"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53425.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53425"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3003a180ef6b9462f3cccc2a89884ef2332d2a1c"},{"fixed":"099e929e7477f37ca16738fc158d7101c0189ca1"},{"fixed":"1b3f25d3894a091abc247eadab266a2c9be64389"},{"fixed":"c1c5826223ae05a48d21f6708c6f34ee9006238c"},{"fixed":"2caeb722f0ea5d2d24af30bb1753a89d449b6aa0"},{"fixed":"776b34615a29551d69d82a0082e7319d5ea284bd"},{"fixed":"b7bd48f0be84e24d21aa3a8f59a8a9cb8633a1c4"},{"fixed":"4d299e6e0ac3cf8ab4517dc29c9294bc4bf72398"},{"fixed":"3df55cd773e8603b623425cc97b05e542854ad27"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53425.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.8.0"},{"fixed":"4.14.324"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.293"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.255"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.192"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.128"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.47"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.12"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53425.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}