{"id":"CVE-2023-54220","summary":"serial: 8250: Fix oops for port-\u003epm on uart_change_pm()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: Fix oops for port-\u003epm on uart_change_pm()\n\nUnloading a hardware specific 8250 driver can produce error \"Unable to\nhandle kernel paging request at virtual address\" about ten seconds after\nunloading the driver. This happens on uart_hangup() calling\nuart_change_pm().\n\nTurns out commit 04e82793f068 (\"serial: 8250: Reinit port-\u003epm on port\nspecific driver unbind\") was only a partial fix. If the hardware specific\ndriver has initialized port-\u003epm function, we need to clear port-\u003epm too.\nJust reinitializing port-\u003eops does not do this. Otherwise serial8250_pm()\nwill call port-\u003epm() instead of serial8250_do_pm().","modified":"2026-03-31T17:29:51.521548155Z","published":"2025-12-30T12:11:15.385Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:0316-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54220.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0c05493341d6f2097f75f0a5dbb7b53a9e8c5f6c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/18e27df4f2b4e257c317ba8076f31a888f6cc64b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/375806616f8c772c33d40e112530887b37c1a816"},{"type":"WEB","url":"https://git.kernel.org/stable/c/66f3e55960698c874b0598277913b478ecd29573"},{"type":"WEB","url":"https://git.kernel.org/stable/c/720a297b334e85d34099e83d1f375b92c3efedd6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b653289ca6460a6552c8590b75dfa84a0140a46b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bd70d0b28010d560a8be96b44fea86fe2ba016ae"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dfe2aeb226fd5e19b0ee795f4f6ed8bc494c1534"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54220.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54220"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"490bf37eaabb0a857ed1ae8e75d8854e41662f1c"},{"fixed":"66f3e55960698c874b0598277913b478ecd29573"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c9e080c3005fd183c56ff8f4d75edb5da0765d2c"},{"fixed":"720a297b334e85d34099e83d1f375b92c3efedd6"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d5cd2928d31042a7c0a01464f9a8d95be736421d"},{"fixed":"b653289ca6460a6552c8590b75dfa84a0140a46b"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2c86a1305c1406f45ea780d06953c484ea1d9e6e"},{"fixed":"bd70d0b28010d560a8be96b44fea86fe2ba016ae"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1ba5594739d858e524ff0f398ee1ebfe0a8b9d41"},{"fixed":"18e27df4f2b4e257c317ba8076f31a888f6cc64b"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"af4d6dbb1a92ea424ad1ba1d0c88c7fa2345d872"},{"fixed":"0c05493341d6f2097f75f0a5dbb7b53a9e8c5f6c"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"04e82793f068d2f0ffe62fcea03d007a8cdc16a7"},{"fixed":"375806616f8c772c33d40e112530887b37c1a816"},{"fixed":"dfe2aeb226fd5e19b0ee795f4f6ed8bc494c1534"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"8e596aed5f2f98cf3e6e98d6fe1d689f4a319308"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54220.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.14.324"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.293"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.255"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.192"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.128"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.47"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.12"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54220.json"}}],"schema_version":"1.7.5"}