We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-52567

serial: 8250_port: Check IRQ data before use



Description

In the Linux kernel, the following vulnerability has been resolved: serial: 8250_port: Check IRQ data before use In case the leaf driver wants to use IRQ polling (irq = 0) and IIR register shows that an interrupt happened in the 8250 hardware the IRQ data can be NULL. In such a case we need to skip the wake event as we came to this path from the timer interrupt and quite likely system is already awake. Without this fix we have got an Oops: serial8250: ttyS0 at I/O 0x3f8 (irq = 0, base_baud = 115200) is a 16550A ... BUG: kernel NULL pointer dereference, address: 0000000000000010 RIP: 0010:serial8250_handle_irq+0x7c/0x240 Call Trace: ? serial8250_handle_irq+0x7c/0x240 ? __pfx_serial8250_timeout+0x10/0x10

Reserved 2024-03-02 | Published 2024-03-02 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

edfe57aedff4ecf3606533aabf8ecf7676c3c5d9 before ee5732caaffba3a37e753fdb89b4958db9a61847
affected

0bd49a043c7984c93c2a0af41222fb71c3986a4e before c334650150c29234b0923476f51573ae1b2f252a
affected

572d48361aa0a6e6f16c1470e5407de183493d0c before bf3c728e3692cc6d998874f0f27d433117348742
affected

d5d628fea5f6181809a9d61b04de6ade53277684 before e14afa4450cb7e4cf93e993a765801203d41d014
affected

424cf29296354d7b9c6c038aaa7bb71782100851 before 2b837f13a818f96304736453ac53b66a70aaa4f2
affected

727e92fe13e81c6088a88d83e466b2b1b553c4e3 before e14f68a48fd445a083ac0750fafcb064df5f18f7
affected

0ba9e3a13c6adfa99e32b2576d20820ab10ad48a before 3345cc5f02f1fb4c4dcb114706f2210d879ab933
affected

0ba9e3a13c6adfa99e32b2576d20820ab10ad48a before cce7fc8b29961b64fadb1ce398dc5ff32a79643b
affected

Default status
affected

6.4
affected

Any version before 6.4
unaffected

4.14.327
unaffected

4.19.296
unaffected

5.4.258
unaffected

5.10.198
unaffected

5.15.134
unaffected

6.1.56
unaffected

6.5.6
unaffected

6.6
unaffected

References

git.kernel.org/...c/ee5732caaffba3a37e753fdb89b4958db9a61847

git.kernel.org/...c/c334650150c29234b0923476f51573ae1b2f252a

git.kernel.org/...c/bf3c728e3692cc6d998874f0f27d433117348742

git.kernel.org/...c/e14afa4450cb7e4cf93e993a765801203d41d014

git.kernel.org/...c/2b837f13a818f96304736453ac53b66a70aaa4f2

git.kernel.org/...c/e14f68a48fd445a083ac0750fafcb064df5f18f7

git.kernel.org/...c/3345cc5f02f1fb4c4dcb114706f2210d879ab933

git.kernel.org/...c/cce7fc8b29961b64fadb1ce398dc5ff32a79643b

cve.org (CVE-2023-52567)

nvd.nist.gov (CVE-2023-52567)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-52567

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.