{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-52567","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-03-02T21:55:42.567Z","datePublished":"2024-03-02T21:59:38.815Z","dateUpdated":"2025-05-04T12:49:17.520Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T12:49:17.520Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250_port: Check IRQ data before use\n\nIn case the leaf driver wants to use IRQ polling (irq = 0) and\nIIR register shows that an interrupt happened in the 8250 hardware\nthe IRQ data can be NULL. In such a case we need to skip the wake\nevent as we came to this path from the timer interrupt and quite\nlikely system is already awake.\n\nWithout this fix we have got an Oops:\n\n    serial8250: ttyS0 at I/O 0x3f8 (irq = 0, base_baud = 115200) is a 16550A\n    ...\n    BUG: kernel NULL pointer dereference, address: 0000000000000010\n    RIP: 0010:serial8250_handle_irq+0x7c/0x240\n    Call Trace:\n     ? serial8250_handle_irq+0x7c/0x240\n     ? __pfx_serial8250_timeout+0x10/0x10"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/tty/serial/8250/8250_port.c"],"versions":[{"version":"edfe57aedff4ecf3606533aabf8ecf7676c3c5d9","lessThan":"ee5732caaffba3a37e753fdb89b4958db9a61847","status":"affected","versionType":"git"},{"version":"0bd49a043c7984c93c2a0af41222fb71c3986a4e","lessThan":"c334650150c29234b0923476f51573ae1b2f252a","status":"affected","versionType":"git"},{"version":"572d48361aa0a6e6f16c1470e5407de183493d0c","lessThan":"bf3c728e3692cc6d998874f0f27d433117348742","status":"affected","versionType":"git"},{"version":"d5d628fea5f6181809a9d61b04de6ade53277684","lessThan":"e14afa4450cb7e4cf93e993a765801203d41d014","status":"affected","versionType":"git"},{"version":"424cf29296354d7b9c6c038aaa7bb71782100851","lessThan":"2b837f13a818f96304736453ac53b66a70aaa4f2","status":"affected","versionType":"git"},{"version":"727e92fe13e81c6088a88d83e466b2b1b553c4e3","lessThan":"e14f68a48fd445a083ac0750fafcb064df5f18f7","status":"affected","versionType":"git"},{"version":"0ba9e3a13c6adfa99e32b2576d20820ab10ad48a","lessThan":"3345cc5f02f1fb4c4dcb114706f2210d879ab933","status":"affected","versionType":"git"},{"version":"0ba9e3a13c6adfa99e32b2576d20820ab10ad48a","lessThan":"cce7fc8b29961b64fadb1ce398dc5ff32a79643b","status":"affected","versionType":"git"},{"version":"d7c6aa39eb041e2a6a53106104200d11e2acc87f","status":"affected","versionType":"git"},{"version":"f5fd2fd999b364801e9790c6f69f3fe3f40ed60f","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/tty/serial/8250/8250_port.c"],"versions":[{"version":"6.4","status":"affected"},{"version":"0","lessThan":"6.4","status":"unaffected","versionType":"semver"},{"version":"4.14.327","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.296","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.258","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.198","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.134","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.56","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.5.6","lessThanOrEqual":"6.5.*","status":"unaffected","versionType":"semver"},{"version":"6.6","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.14.315","versionEndExcluding":"4.14.327"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.283","versionEndExcluding":"4.19.296"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.243","versionEndExcluding":"5.4.258"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.180","versionEndExcluding":"5.10.198"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.111","versionEndExcluding":"5.15.134"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.28","versionEndExcluding":"6.1.56"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4","versionEndExcluding":"6.5.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4","versionEndExcluding":"6.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.15"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.3.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/ee5732caaffba3a37e753fdb89b4958db9a61847"},{"url":"https://git.kernel.org/stable/c/c334650150c29234b0923476f51573ae1b2f252a"},{"url":"https://git.kernel.org/stable/c/bf3c728e3692cc6d998874f0f27d433117348742"},{"url":"https://git.kernel.org/stable/c/e14afa4450cb7e4cf93e993a765801203d41d014"},{"url":"https://git.kernel.org/stable/c/2b837f13a818f96304736453ac53b66a70aaa4f2"},{"url":"https://git.kernel.org/stable/c/e14f68a48fd445a083ac0750fafcb064df5f18f7"},{"url":"https://git.kernel.org/stable/c/3345cc5f02f1fb4c4dcb114706f2210d879ab933"},{"url":"https://git.kernel.org/stable/c/cce7fc8b29961b64fadb1ce398dc5ff32a79643b"}],"title":"serial: 8250_port: Check IRQ data before use","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-21T16:12:47.412833Z","id":"CVE-2023-52567","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-21T16:12:54.742Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:03:20.694Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/ee5732caaffba3a37e753fdb89b4958db9a61847","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/c334650150c29234b0923476f51573ae1b2f252a","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/bf3c728e3692cc6d998874f0f27d433117348742","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/e14afa4450cb7e4cf93e993a765801203d41d014","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/2b837f13a818f96304736453ac53b66a70aaa4f2","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/e14f68a48fd445a083ac0750fafcb064df5f18f7","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/3345cc5f02f1fb4c4dcb114706f2210d879ab933","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/cce7fc8b29961b64fadb1ce398dc5ff32a79643b","tags":["x_transferred"]}]}]}}