CVE-2023-54026

Source
https://cve.org/CVERecord?id=CVE-2023-54026
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54026.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54026
Downstream
Related
Published
2025-12-24T10:55:55.182Z
Modified
2026-03-31T17:29:37.279659019Z
Summary
opp: Fix use-after-free in lazy_opp_tables after probe deferral
Details

In the Linux kernel, the following vulnerability has been resolved:

opp: Fix use-after-free in lazyopptables after probe deferral

When devpmoppoffindiccpaths() in allocateopptable() returns -EPROBEDEFER, the opp_table is freed again, to wait until all the interconnect paths are available.

However, if the OPP table is using required-opps then it may already have been added to the global lazyopptables list. The error path does not remove the opp_table from the list again.

This can cause crashes later when the provider of the required-opps is added, since we will iterate over OPP tables that have already been freed. E.g.:

Unable to handle kernel NULL pointer dereference when read CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.4.0-rc3 PC is at ofaddopptablev2 (include/linux/of.h:949 drivers/opp/of.c:98 drivers/opp/of.c:344 drivers/opp/of.c:404 drivers/opp/of.c:1032) -> lazylinkrequiredopp_table()

Fix this by calling ofclearopptable() to remove the opptable from the list and clear other allocated resources. While at it, also add the missing mutexdestroy() calls in the error path.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54026.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7eba0c7641b0009818e469dbfcdd87a0155ab9d4
Fixed
39a0e723d3502f6dc4c603f57ebe8dc7bcc4a4bc
Fixed
76ab057de777723ec924654502d1a260ba7d7d54
Fixed
c05e76d6b249e5254c31994eedd06dd3cc90dee0
Fixed
b2a2ab039bd58f51355e33d7d3fc64605d7f870d

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54026.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.12.0
Fixed
5.15.121
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.40
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54026.json"