CVE-2023-54298
Description
In the Linux kernel, the following vulnerability has been resolved:
thermal: intel: quark_dts: fix error pointer dereference
If alloc_soc_dts() fails, then we can just return. Trying to free "soc_dts" will lead to an Oops.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's Intel Quark DTS thermal driver, a failed allocation leads to an error pointer dereference, causing a kernel Oops.
Vulnerability
Details
The vulnerability resides in the Intel Quark DTS (Digital Thermal Sensor) thermal driver in the Linux kernel. When the alloc_soc_dts() function fails, the driver attempts to free the soc_dts pointer, which is an error pointer. This results in a null pointer dereference or an invalid memory access, leading to a kernel Oops [1][2][3][4].
Exploitation
The bug is triggered when memory allocation for the thermal sensor data structure fails. This can occur under low memory conditions or if the system is under memory pressure. No special privileges are required beyond the ability to trigger the driver's initialization, which typically happens during boot or when the thermal subsystem is loaded. An attacker with local access could potentially force memory exhaustion to trigger this condition, causing a denial of service.
Impact
Successful exploitation results in a kernel panic (Oops), causing a system crash and denial of service. This can disrupt operations on systems using the Intel Quark SoC, which is often found in embedded and IoT devices.
Mitigation
The fix has been applied to the Linux kernel stable branches [1][2][3][4]. Users are advised to update their kernels to the latest stable version that includes the patch. No workaround is available other than applying the kernel update.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
80b366c6a42e2d0178f2788fbe23f1d9e6e03f73134231fa25eaf55b3869169e49f1b536024c221b11c28f1b930e74081Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/0b366c6a42e2e2bc67af8d1130b68f3bfa31c80envd
- git.kernel.org/stable/c/24c221b11c2894e1a5f07b93362d9bc91c6d8be7nvd
- git.kernel.org/stable/c/5eaf55b38691291d49417c22e726591078ca1893nvd
- git.kernel.org/stable/c/69e49f1b53605706bc2203455021539aba2ebe21nvd
- git.kernel.org/stable/c/d0178f2788fb1183a5cc350213efdc94010b9147nvd
- git.kernel.org/stable/c/e23f1d9e6e03d04da2f18e78ab5d4255ffeb1333nvd
- git.kernel.org/stable/c/f1b930e740811d416de4d2074da48b6633a672c8nvd
- git.kernel.org/stable/c/f73134231fa23e0856c15010db5f5c03693c1e92nvd
News mentions
0No linked articles in our index yet.