blob: 8502d9f65f2b5b37d39b704c50cada17c9f12260 [file] [log] [blame]
{
"containers": {
"cna": {
"providerMetadata": {
"orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038"
},
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250_port: Check IRQ data before use\n\nIn case the leaf driver wants to use IRQ polling (irq = 0) and\nIIR register shows that an interrupt happened in the 8250 hardware\nthe IRQ data can be NULL. In such a case we need to skip the wake\nevent as we came to this path from the timer interrupt and quite\nlikely system is already awake.\n\nWithout this fix we have got an Oops:\n\n serial8250: ttyS0 at I/O 0x3f8 (irq = 0, base_baud = 115200) is a 16550A\n ...\n BUG: kernel NULL pointer dereference, address: 0000000000000010\n RIP: 0010:serial8250_handle_irq+0x7c/0x240\n Call Trace:\n ? serial8250_handle_irq+0x7c/0x240\n ? __pfx_serial8250_timeout+0x10/0x10"
}
],
"affected": [
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "unaffected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"drivers/tty/serial/8250/8250_port.c"
],
"versions": [
{
"version": "edfe57aedff4ecf3606533aabf8ecf7676c3c5d9",
"lessThan": "ee5732caaffba3a37e753fdb89b4958db9a61847",
"status": "affected",
"versionType": "git"
},
{
"version": "0bd49a043c7984c93c2a0af41222fb71c3986a4e",
"lessThan": "c334650150c29234b0923476f51573ae1b2f252a",
"status": "affected",
"versionType": "git"
},
{
"version": "572d48361aa0a6e6f16c1470e5407de183493d0c",
"lessThan": "bf3c728e3692cc6d998874f0f27d433117348742",
"status": "affected",
"versionType": "git"
},
{
"version": "d5d628fea5f6181809a9d61b04de6ade53277684",
"lessThan": "e14afa4450cb7e4cf93e993a765801203d41d014",
"status": "affected",
"versionType": "git"
},
{
"version": "424cf29296354d7b9c6c038aaa7bb71782100851",
"lessThan": "2b837f13a818f96304736453ac53b66a70aaa4f2",
"status": "affected",
"versionType": "git"
},
{
"version": "727e92fe13e81c6088a88d83e466b2b1b553c4e3",
"lessThan": "e14f68a48fd445a083ac0750fafcb064df5f18f7",
"status": "affected",
"versionType": "git"
},
{
"version": "0ba9e3a13c6adfa99e32b2576d20820ab10ad48a",
"lessThan": "3345cc5f02f1fb4c4dcb114706f2210d879ab933",
"status": "affected",
"versionType": "git"
},
{
"version": "0ba9e3a13c6adfa99e32b2576d20820ab10ad48a",
"lessThan": "cce7fc8b29961b64fadb1ce398dc5ff32a79643b",
"status": "affected",
"versionType": "git"
},
{
"version": "d7c6aa39eb041e2a6a53106104200d11e2acc87f",
"status": "affected",
"versionType": "git"
},
{
"version": "f5fd2fd999b364801e9790c6f69f3fe3f40ed60f",
"status": "affected",
"versionType": "git"
}
]
},
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "affected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"drivers/tty/serial/8250/8250_port.c"
],
"versions": [
{
"version": "6.4",
"status": "affected"
},
{
"version": "0",
"lessThan": "6.4",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "4.14.327",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "4.19.296",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.4.258",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.10.198",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.15.134",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.1.56",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.5.6",
"lessThanOrEqual": "6.5.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.6",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.14.315",
"versionEndExcluding": "4.14.327"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19.283",
"versionEndExcluding": "4.19.296"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.243",
"versionEndExcluding": "5.4.258"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.180",
"versionEndExcluding": "5.10.198"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15.111",
"versionEndExcluding": "5.15.134"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.28",
"versionEndExcluding": "6.1.56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4",
"versionEndExcluding": "6.5.6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4",
"versionEndExcluding": "6.6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.3.2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/ee5732caaffba3a37e753fdb89b4958db9a61847"
},
{
"url": "https://git.kernel.org/stable/c/c334650150c29234b0923476f51573ae1b2f252a"
},
{
"url": "https://git.kernel.org/stable/c/bf3c728e3692cc6d998874f0f27d433117348742"
},
{
"url": "https://git.kernel.org/stable/c/e14afa4450cb7e4cf93e993a765801203d41d014"
},
{
"url": "https://git.kernel.org/stable/c/2b837f13a818f96304736453ac53b66a70aaa4f2"
},
{
"url": "https://git.kernel.org/stable/c/e14f68a48fd445a083ac0750fafcb064df5f18f7"
},
{
"url": "https://git.kernel.org/stable/c/3345cc5f02f1fb4c4dcb114706f2210d879ab933"
},
{
"url": "https://git.kernel.org/stable/c/cce7fc8b29961b64fadb1ce398dc5ff32a79643b"
}
],
"title": "serial: 8250_port: Check IRQ data before use",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2023-52567",
"requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0"
}