{"id":"CVE-2023-52567","summary":"serial: 8250_port: Check IRQ data before use","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250_port: Check IRQ data before use\n\nIn case the leaf driver wants to use IRQ polling (irq = 0) and\nIIR register shows that an interrupt happened in the 8250 hardware\nthe IRQ data can be NULL. In such a case we need to skip the wake\nevent as we came to this path from the timer interrupt and quite\nlikely system is already awake.\n\nWithout this fix we have got an Oops:\n\n    serial8250: ttyS0 at I/O 0x3f8 (irq = 0, base_baud = 115200) is a 16550A\n    ...\n    BUG: kernel NULL pointer dereference, address: 0000000000000010\n    RIP: 0010:serial8250_handle_irq+0x7c/0x240\n    Call Trace:\n     ? serial8250_handle_irq+0x7c/0x240\n     ? __pfx_serial8250_timeout+0x10/0x10","modified":"2026-04-11T12:46:32.887056Z","published":"2024-03-02T21:59:38.815Z","related":["SUSE-SU-2024:1320-1","SUSE-SU-2024:1321-1","SUSE-SU-2024:1466-1","SUSE-SU-2024:1480-1","SUSE-SU-2024:1490-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52567.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2b837f13a818f96304736453ac53b66a70aaa4f2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3345cc5f02f1fb4c4dcb114706f2210d879ab933"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bf3c728e3692cc6d998874f0f27d433117348742"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c334650150c29234b0923476f51573ae1b2f252a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cce7fc8b29961b64fadb1ce398dc5ff32a79643b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e14afa4450cb7e4cf93e993a765801203d41d014"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e14f68a48fd445a083ac0750fafcb064df5f18f7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ee5732caaffba3a37e753fdb89b4958db9a61847"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52567.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52567"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"edfe57aedff4ecf3606533aabf8ecf7676c3c5d9"},{"fixed":"ee5732caaffba3a37e753fdb89b4958db9a61847"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0bd49a043c7984c93c2a0af41222fb71c3986a4e"},{"fixed":"c334650150c29234b0923476f51573ae1b2f252a"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"572d48361aa0a6e6f16c1470e5407de183493d0c"},{"fixed":"bf3c728e3692cc6d998874f0f27d433117348742"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d5d628fea5f6181809a9d61b04de6ade53277684"},{"fixed":"e14afa4450cb7e4cf93e993a765801203d41d014"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"424cf29296354d7b9c6c038aaa7bb71782100851"},{"fixed":"2b837f13a818f96304736453ac53b66a70aaa4f2"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"727e92fe13e81c6088a88d83e466b2b1b553c4e3"},{"fixed":"e14f68a48fd445a083ac0750fafcb064df5f18f7"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0ba9e3a13c6adfa99e32b2576d20820ab10ad48a"},{"fixed":"3345cc5f02f1fb4c4dcb114706f2210d879ab933"},{"fixed":"cce7fc8b29961b64fadb1ce398dc5ff32a79643b"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"d7c6aa39eb041e2a6a53106104200d11e2acc87f"},{"last_affected":"f5fd2fd999b364801e9790c6f69f3fe3f40ed60f"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52567.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.14.327"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.296"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.258"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.134"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.56"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.5.6"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52567.json"}}],"schema_version":"1.7.5"}