{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-54220","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-30T12:06:44.501Z","datePublished":"2025-12-30T12:11:15.385Z","dateUpdated":"2026-05-11T19:57:46.400Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:57:46.400Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: Fix oops for port->pm on uart_change_pm()\n\nUnloading a hardware specific 8250 driver can produce error \"Unable to\nhandle kernel paging request at virtual address\" about ten seconds after\nunloading the driver. This happens on uart_hangup() calling\nuart_change_pm().\n\nTurns out commit 04e82793f068 (\"serial: 8250: Reinit port->pm on port\nspecific driver unbind\") was only a partial fix. If the hardware specific\ndriver has initialized port->pm function, we need to clear port->pm too.\nJust reinitializing port->ops does not do this. Otherwise serial8250_pm()\nwill call port->pm() instead of serial8250_do_pm()."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/tty/serial/8250/8250_port.c"],"versions":[{"version":"490bf37eaabb0a857ed1ae8e75d8854e41662f1c","lessThan":"66f3e55960698c874b0598277913b478ecd29573","status":"affected","versionType":"git"},{"version":"c9e080c3005fd183c56ff8f4d75edb5da0765d2c","lessThan":"720a297b334e85d34099e83d1f375b92c3efedd6","status":"affected","versionType":"git"},{"version":"d5cd2928d31042a7c0a01464f9a8d95be736421d","lessThan":"b653289ca6460a6552c8590b75dfa84a0140a46b","status":"affected","versionType":"git"},{"version":"2c86a1305c1406f45ea780d06953c484ea1d9e6e","lessThan":"bd70d0b28010d560a8be96b44fea86fe2ba016ae","status":"affected","versionType":"git"},{"version":"1ba5594739d858e524ff0f398ee1ebfe0a8b9d41","lessThan":"18e27df4f2b4e257c317ba8076f31a888f6cc64b","status":"affected","versionType":"git"},{"version":"af4d6dbb1a92ea424ad1ba1d0c88c7fa2345d872","lessThan":"0c05493341d6f2097f75f0a5dbb7b53a9e8c5f6c","status":"affected","versionType":"git"},{"version":"04e82793f068d2f0ffe62fcea03d007a8cdc16a7","lessThan":"375806616f8c772c33d40e112530887b37c1a816","status":"affected","versionType":"git"},{"version":"04e82793f068d2f0ffe62fcea03d007a8cdc16a7","lessThan":"dfe2aeb226fd5e19b0ee795f4f6ed8bc494c1534","status":"affected","versionType":"git"},{"version":"8e596aed5f2f98cf3e6e98d6fe1d689f4a319308","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/tty/serial/8250/8250_port.c"],"versions":[{"version":"6.4","status":"affected"},{"version":"0","lessThan":"6.4","status":"unaffected","versionType":"semver"},{"version":"4.14.324","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.293","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.255","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.192","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.128","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.47","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.4.12","lessThanOrEqual":"6.4.*","status":"unaffected","versionType":"semver"},{"version":"6.5","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.14.316","versionEndExcluding":"4.14.324"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.284","versionEndExcluding":"4.19.293"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.244","versionEndExcluding":"5.4.255"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.181","versionEndExcluding":"5.10.192"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.113","versionEndExcluding":"5.15.128"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.30","versionEndExcluding":"6.1.47"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4","versionEndExcluding":"6.4.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4","versionEndExcluding":"6.5"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.3.4"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/66f3e55960698c874b0598277913b478ecd29573"},{"url":"https://git.kernel.org/stable/c/720a297b334e85d34099e83d1f375b92c3efedd6"},{"url":"https://git.kernel.org/stable/c/b653289ca6460a6552c8590b75dfa84a0140a46b"},{"url":"https://git.kernel.org/stable/c/bd70d0b28010d560a8be96b44fea86fe2ba016ae"},{"url":"https://git.kernel.org/stable/c/18e27df4f2b4e257c317ba8076f31a888f6cc64b"},{"url":"https://git.kernel.org/stable/c/0c05493341d6f2097f75f0a5dbb7b53a9e8c5f6c"},{"url":"https://git.kernel.org/stable/c/375806616f8c772c33d40e112530887b37c1a816"},{"url":"https://git.kernel.org/stable/c/dfe2aeb226fd5e19b0ee795f4f6ed8bc494c1534"}],"title":"serial: 8250: Fix oops for port->pm on uart_change_pm()","x_generator":{"engine":"bippy-1.2.0"}}}}