| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" |
| }, |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL\n\nBaoquan reported that after triggering a crash the subsequent crash-kernel\nfails to boot about half of the time. It triggers a NULL pointer\ndereference in the periodic tick code.\n\nThis happens because the legacy timer interrupt (IRQ0) is resent in\nsoftware which happens in soft interrupt (tasklet) context. In this context\nget_irq_regs() returns NULL which leads to the NULL pointer dereference.\n\nThe reason for the resend is a spurious APIC interrupt on the IRQ0 vector\nwhich is captured and leads to a resend when the legacy timer interrupt is\nenabled. This is wrong because the legacy PIC interrupts are level\ntriggered and therefore should never be resent in software, but nothing\never sets the IRQ_LEVEL flag on those interrupts, so the core code does not\nknow about their trigger type.\n\nEnsure that IRQ_LEVEL is set when the legacy PCI interrupts are set up." |
| } |
| ], |
| "affected": [ |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "arch/x86/kernel/i8259.c", |
| "arch/x86/kernel/irqinit.c" |
| ], |
| "versions": [ |
| { |
| "version": "a4633adcdbc15ac51afcd0e1395de58cee27cf92", |
| "lessThan": "744fe9be9665227335539b7a77ece8d9ff62b6c0", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "a4633adcdbc15ac51afcd0e1395de58cee27cf92", |
| "lessThan": "496975d1a2937f4baadf3d985991b13fc4fc4f27", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "a4633adcdbc15ac51afcd0e1395de58cee27cf92", |
| "lessThan": "8770cd9d7c14aa99c255a0d08186f0be953e1638", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "a4633adcdbc15ac51afcd0e1395de58cee27cf92", |
| "lessThan": "e284c273dbb4c1ed68d4204bff94d0b10e4a90f5", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "a4633adcdbc15ac51afcd0e1395de58cee27cf92", |
| "lessThan": "0b08201158f177aab469e356b4d6af24fdd118df", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "a4633adcdbc15ac51afcd0e1395de58cee27cf92", |
| "lessThan": "137f1b47da5f58805da42c1b7811e28c1e353f39", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "a4633adcdbc15ac51afcd0e1395de58cee27cf92", |
| "lessThan": "5fa55950729d0762a787451dc52862c3f850f859", |
| "status": "affected", |
| "versionType": "git" |
| } |
| ] |
| }, |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "affected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "arch/x86/kernel/i8259.c", |
| "arch/x86/kernel/irqinit.c" |
| ], |
| "versions": [ |
| { |
| "version": "2.6.18", |
| "status": "affected" |
| }, |
| { |
| "version": "0", |
| "lessThan": "2.6.18", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "4.14.305", |
| "lessThanOrEqual": "4.14.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "4.19.272", |
| "lessThanOrEqual": "4.19.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.4.231", |
| "lessThanOrEqual": "5.4.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.10.166", |
| "lessThanOrEqual": "5.10.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.15.91", |
| "lessThanOrEqual": "5.15.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.1.9", |
| "lessThanOrEqual": "6.1.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.2", |
| "lessThanOrEqual": "*", |
| "status": "unaffected", |
| "versionType": "original_commit_for_fix" |
| } |
| ] |
| } |
| ], |
| "cpeApplicability": [ |
| { |
| "nodes": [ |
| { |
| "operator": "OR", |
| "negate": false, |
| "cpeMatch": [ |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "2.6.18", |
| "versionEndExcluding": "4.14.305" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "2.6.18", |
| "versionEndExcluding": "4.19.272" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "2.6.18", |
| "versionEndExcluding": "5.4.231" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "2.6.18", |
| "versionEndExcluding": "5.10.166" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "2.6.18", |
| "versionEndExcluding": "5.15.91" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "2.6.18", |
| "versionEndExcluding": "6.1.9" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "2.6.18", |
| "versionEndExcluding": "6.2" |
| } |
| ] |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://git.kernel.org/stable/c/744fe9be9665227335539b7a77ece8d9ff62b6c0" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/496975d1a2937f4baadf3d985991b13fc4fc4f27" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/8770cd9d7c14aa99c255a0d08186f0be953e1638" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/e284c273dbb4c1ed68d4204bff94d0b10e4a90f5" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/0b08201158f177aab469e356b4d6af24fdd118df" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/137f1b47da5f58805da42c1b7811e28c1e353f39" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/5fa55950729d0762a787451dc52862c3f850f859" |
| } |
| ], |
| "title": "x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL", |
| "x_generator": { |
| "engine": "bippy-1.2.0" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", |
| "cveID": "CVE-2023-52993", |
| "requesterUserId": "gregkh@kernel.org", |
| "serial": "1", |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |